Hey, this is a simple writeup on the challenges provided by picoCTF
Hope you find it useful ;)
For this challenge you should think about the HTTP request methods (GET, POST, PUT, DELETE, HEAD,…)
See the HEAD there? Does it look like something you have on the title of the challenge? xP
The HEAD gives you the website’s metadata. It should do the same thing as a GET but without all the body, although sometimes they are different.
You can use Burp Suite to check the responses but I think there’s a simpler way to get it! Open up a terminal and type:
curl -I http://mercury.picoctf.net:28916/
If you go to the curl options, the -I is how youll get the HEAD.
This challenge puts your dev tools knowledge to the test eheh
In Google Chrome press F12 and go to the “Application” tab.
You’ll see the cookies there, mess around with the value and find the right one to give you the challenge flag.
It’s funny that you can think about several ways of using this in a pentest or vulnerability assessment.
One of the most common examples is an e-commerce website where normally the checkout carts could have a cookie session ID that you could change and see the cart of another person. Now imagine this on a bank application where you could have access to other people’s accounts and mess with it… Nasty!
Knowing the previous one, this will be a walk in the park!
Just go to the “Sources” tab this time and see all the files there.
This is a little bit trickier than the last one.
Yes you start exactly like the last one but you’ll have to master some other web shenanigans :)
So lets take a look at the steps required:
- Go to the “Sources” tab
- Check the (index) file –> 1st flag part
- Check mycss.css file –> 2nd flag part
- Get clue on myjs.js file. Do you know which file are they talking about?
- Add “/robots.txt” to the URL –> 3rd flag part. There’s a clue in it about an access configuration file.
- Remove previous one and add “/.htaccess” –> 4th flag part. There’s yet another clue in it about the macOS storage system
- Remove previous one and add “/.DS_Store” –> 5th flag part
All files in a website may contain valuable information for possible exploitation! Specially if those are configuration files that could be tempered with.
will add more, just don’t really know when :P