🌐 Irish-Name-Repo 1
A detailed write-up of the Web challenge 'Irish-Name-Repo 1' from PicoCTF - 2019
📊 Challenge Overview
Category Details Additional Info 🏆 Event PicoGym Event Link 🔰 Category Web 🌐 💎 Points 500 Out of 500 total ⭐ Difficulty 🟡 Medium Personal Rating: 0/10 👤 Author Chris Hensler Profile 🎮 Solves (At the time of flag submission) 20.632 solve rate 📅 Date 22-02-2025 PicoGym 🦾 Solved By mH4ck3r0n3 Team:
📝 Challenge Information
There is a website running at https://jupiter.challenges.picoctf.org/problem/50009/ (link) or http://jupiter.challenges.picoctf.org:50009. Do you think you can log us in? Try to see if you can login!
🎯 Challenge Files & Infrastructure
Provided Files
1
Files: None
🔍 Initial Analysis
First Steps
Initially, the website appears as follows:
Clicking on the
hamburger menu
, I found an interesting page for theadmin login
:Here, I immediately thought of an
SQL Injection
, since inspecting the page source didn’t reveal anything interesting. Let’s move on to the exploitation phase.PS: By the time I reached the third challenge in this series, I discovered there is a parameter in the form
debug=0
, which, when set to1
, shows the query… So always remember to inspect the page source.
🔬 Vulnerability Analysis
Potential Vulnerabilities
- SQL Injection
🎯 Solution Path
Exploitation Steps
Initial setup
We have an
admin
username, which we found on theSupport
page from the menu seen earlier:We can use this for a potential injection. Let’s move on to the exploitation phase.
Exploitation
The information gathered (about the
admin
user) turned out to be pretty useless, as it was a very simpleSQL Injection
. By entering the following in theusername
field:
1
' OR 1=1 --
I gained access and consequently obtained the flag.
Flag capture
🛠️ Exploitation Process
Approach
The automatic exploit sends a simple POST request with the payload
username=' OR 1=1 --
andpassword=
, then, once access is granted, it extracts the flag from the response using a regex.
🚩 Flag Capture
Flag
Proof of Execution
🔧 Tools Used
Tool Purpose Python Exploit
💡 Key Learnings
Time Optimization
When there’s a login in a blackbox challenge, always try an SQL Injection (unless there are things like
admin bot
(XSS case) orjwt
tokens).
Skills Improved
- Binary Exploitation
- Reverse Engineering
- Web Exploitation
- Cryptography
- Forensics
- OSINT
- Miscellaneous
📚 References & Resources
Learning Resources
📊 Final Statistics
Metric | Value | Notes |
---|---|---|
Time to Solve | 00:01 | From start to flag |
Global Ranking (At the time of flag submission) | Challenge ranking | |
Points Earned | 500 | Team contribution |
Created: 22-02-2025 • Last Modified: 22-02-2025 *Author: mH4ck3r0n3 • Team: *