YCTF Weekly
HomeTeamHall of FameRegister
  • Writeups ✍
    • 🚩YCTF0x01
      • Micky Mouse Writeup
    • 🚩YCTF0x02
Powered by GitBook
On this page
  • 1. Easy
  • 2. Never found
  • 3. Cookie
  • 4. IE10.1
  • 5. Confluence
  • 6. VM Writeup

Was this helpful?

  1. Writeups ✍

🚩YCTF0x02

YCTF Weekly 2 writeups

PreviousMicky Mouse Writeup

Last updated 1 year ago

Was this helpful?

1. Easy

Category: Reverse Engineering

Description: Dude, It's an easy challenge.

Challenge file: <link>

Credit:

Solution: Executing the binary on linux asks for the password.

Now, use strings to get the exact matching pattern for passphrase.

We got some strange string 4/*A1zqi!*9 before the Passphrase, let's try to enter the string when asked for the password.

After we enter the passphrase, we get something in HEX format.

594354467b336173795f7233765f643065736e315f723371753172335f627261316e7d

Pasting on cyberchef, we get the actual flag.

2. Never found

Category: Miscellaneus

Description: My friend is spying on our ycfteam website. But the page he was trying to access was never found later.

Hint:

Solution: Understand the challenge name and description, what does it say?

Never found Which indicated/ similar to Not found. searching the Archive web for the 404 not found page on https://ycfteam.in/404,

We get the flag!

3. Cookie

Description: Well, there is only one way to survive.

Solution: Visiting the URL, we get the following page to enter the name. Some of you might think it is vulnerable to XSS. But hold on!

Directory bruteforcing will lead to the following result which reveals /cookie and /robots.txt

Visiting the robots.txt, we get another directory /sup3r_s3cr3t_d1r

Visiting /cookie directory to get the cookie, and we get the JWT token.

Now visit the /cookie again and change the cookie and refresh the page.

Then visit the /sup3r_s3cr3t_d1r again to get the flag!!!!

4. IE10.1

Description: Don't run away from problems; facing and solving them is the key to success.

Credit: Gourav Suram

5. Confluence

Description: Help my friend to download the flag.

Writeup credit: Gourav Suram

6. VM Writeup

Link:

Credit:

Link:

Credit:

Take the token and paste it on change the values as admin: true and answer: yes

Link:

Writeup link:

Link:

Credit:

Writeup link:

https://ycfteam.in
Munazir
https://cookiechallenge.pythonanywhere.com/
Munazir
https://token.dev
http://yctfinternet.liveblog365.com/
https://heapbytes.gitbook.io/notes/ctf-writeups/2023-ctfs/yctf-week-2-9-dec-23/web-security
http://139.59.45.27:8090/admin/flag.tar.gz
Munazir
https://heapbytes.gitbook.io/notes/ctf-writeups/2023-ctfs/yctf-week-2-9-dec-23/web-security/confluence
Munazir