Contents

🌐 IntroToBurp

A detailed write-up of the Web challenge 'IntroToBurp' from PicoCTF - 2024

/images/PicoGym/PicoCTF-2024/IntroToBurp/challenge_presentation.png
Challenge Presentation

📊 Challenge Overview

Category Details Additional Info
🏆 Event PicoGym Event Link
🔰 Category Web 🌐
💎 Points Out of 500 total
⭐ Difficulty 🟢 Easy Personal Rating: 1/10
👤 Author Nana Ama Atombo-Sackey & Sabine Gisagara Profile
🎮 Solves 21.217 solve rate
📅 Date 28-01-2025 PicoGym
🦾 Solved By mH4ck3r0n3 Team:

📝 Challenge Information

Try here to find the flag

🎯 Challenge Files & Infrastructure

Provided Files

1
Files: None

🔍 Initial Analysis

First Steps

Initially, the website appears as follows:

/images/PicoGym/PicoCTF-2024/IntroToBurp/site_presentation.png
Site Presentation

As we can see, there is a registration phase. By trying random data in all the fields, such as aa, I noticed that there was no validation on the data’s correctness. Subsequently, you are redirected to /dashboard, where this input for an OTP (One Time Password) appears:

/images/PicoGym/PicoCTF-2024/IntroToBurp/otp.png
OTP

However, since I didn’t have it, I decided to analyze the request with Burp:

/images/PicoGym/PicoCTF-2024/IntroToBurp/invalid_otp.png
Invalid OTP

So, I decided to send the request to Burp’s Repeater and perform some tests, such as sending an empty OTP (which didn’t work). From here, we can proceed with the exploit.

🔬 Vulnerability Analysis

Potential Vulnerabilities

  • Broken Access Control

🎯 Solution Path

Exploitation Steps

Exploitation

The exploit wasn’t too complex; it was simply a matter of removing the otp parameter from the request using Burp, and then the flag was displayed in the response.

Flag capture

/images/PicoGym/PicoCTF-2024/IntroToBurp/manual_flag.png
Manual Flag

🛠️ Exploitation Process

Approach

The exploit first extracts the CSRF Token, as it wouldn’t work without it. Then, it proceeds with the registration phase using random data such as aa for each field. Finally, it makes a POST request to /dashboard without specifying the otp field, as there is no validation, and when the field is not provided, access to the flag is granted.

🚩 Flag Capture

Flag

Proof of Execution

/images/PicoGym/PicoCTF-2024/IntroToBurp/automated_flag.png
Automated Flag
Screenshot of successful exploitation

🔧 Tools Used

Tool Purpose
Python Exploit
Burp Suite Web Testing

💡 Key Learnings

New Knowledge

I learned that sometimes, by not specifying a parameter, the server might expect it, but due to insufficient validation, unexpected behavior could occur.

Time Optimization

Sometimes, trying to remove parameters from the request to observe the server’s behavior can be useful.

Skills Improved

  • Binary Exploitation
  • Reverse Engineering
  • Web Exploitation
  • Cryptography
  • Forensics
  • OSINT
  • Miscellaneous

📊 Final Statistics

Metric Value Notes
Time to Solve 00:02 From start to flag
Global Ranking Challenge ranking
Points Earned Team contribution

Created: 28-01-2025 • Last Modified: 28-01-2025 *Author: mH4ck3r0n3 • Team: *