🌐 IntroToBurp
A detailed write-up of the Web challenge 'IntroToBurp' from PicoCTF - 2024
📊 Challenge Overview
Category Details Additional Info 🏆 Event PicoGym Event Link 🔰 Category Web 🌐 💎 Points Out of 500 total ⭐ Difficulty 🟢 Easy Personal Rating: 1/10 👤 Author Nana Ama Atombo-Sackey & Sabine Gisagara Profile 🎮 Solves 21.217 solve rate 📅 Date 28-01-2025 PicoGym 🦾 Solved By mH4ck3r0n3 Team:
📝 Challenge Information
Try here to find the flag
🎯 Challenge Files & Infrastructure
Provided Files
1
Files: None
🔍 Initial Analysis
First Steps
Initially, the website appears as follows:
As we can see, there is a registration phase. By trying random data in all the fields, such as
aa
, I noticed that there was no validation on the data’s correctness. Subsequently, you are redirected to/dashboard
, where this input for anOTP (One Time Password)
appears:However, since I didn’t have it, I decided to analyze the request with Burp:
So, I decided to send the request to Burp’s
Repeater
and perform some tests, such as sending an empty OTP (which didn’t work). From here, we can proceed with the exploit.
🔬 Vulnerability Analysis
Potential Vulnerabilities
- Broken Access Control
🎯 Solution Path
Exploitation Steps
Exploitation
The exploit wasn’t too complex; it was simply a matter of removing the
otp
parameter from the request using Burp, and then the flag was displayed in the response.
Flag capture
🛠️ Exploitation Process
Approach
The exploit first extracts the CSRF Token, as it wouldn’t work without it. Then, it proceeds with the registration phase using random data such as
aa
for each field. Finally, it makes a POST request to/dashboard
without specifying theotp
field, as there is no validation, and when the field is not provided, access to the flag is granted.
🚩 Flag Capture
Flag
Proof of Execution
🔧 Tools Used
Tool Purpose Python Exploit Burp Suite Web Testing
💡 Key Learnings
New Knowledge
I learned that sometimes, by not specifying a parameter, the server might expect it, but due to insufficient validation, unexpected behavior could occur.
Time Optimization
Sometimes, trying to remove parameters from the request to observe the server’s behavior can be useful.
Skills Improved
- Binary Exploitation
- Reverse Engineering
- Web Exploitation
- Cryptography
- Forensics
- OSINT
- Miscellaneous
📊 Final Statistics
Metric | Value | Notes |
---|---|---|
Time to Solve | 00:02 | From start to flag |
Global Ranking | Challenge ranking | |
Points Earned | Team contribution |
Created: 28-01-2025 • Last Modified: 28-01-2025 *Author: mH4ck3r0n3 • Team: *