🌐 Picobrowser
A detailed write-up of the Web challenge 'Picobrowser' from PicoCTF - 2019
📊 Challenge Overview
Category Details Additional Info 🏆 Event PicoGym Event Link 🔰 Category Web 🌐 💎 Points 500 Out of 500 total ⭐ Difficulty 🟡 Medium Personal Rating: 1/10 👤 Author Archit Profile 🎮 Solves (At the time of flag submission) 32.177 solve rate 📅 Date 21-02-2025 PicoGym 🦾 Solved By mH4ck3r0n3 Team: 
📝 Challenge Information
This website can be rendered only by picobrowser, go and catch the flag! https://jupiter.challenges.picoctf.org/problem/26704/ (link) or http://jupiter.challenges.picoctf.org:26704
🎯 Challenge Files & Infrastructure
Provided Files
1Files: None
🔍 Initial Analysis
First Steps
Initially, the website appears as follows:
Clicking on the
Flagbutton gives me an error message:
you are not picobrowserand then theUser-Agentheader field from the request I made is printed. From here, one should already understand the resolution of this challenge.
🎯 Solution Path
Exploitation Steps
Initial setup
First, I intercepted the request with
Caido:And as we can see in the
User-Agentheader field, it contains the sameUser-Agentseen in the 🔍 Initial Analysis section. Let’s proceed with the exploitation.
Exploitation
The
User-Agentfield is designed to identify the user agent responsible for sending a specific HTTP request. So, we can simply replace it directly withCaido, making itUser-Agent: picobrowser. After forwarding the request, I obtained the flag in the response.
Flag capture
🛠️ Exploitation Process
Approach
The exploit sends a simple GET request to
/flagwith theUser-Agent: picobrowserheader, then extracts the flag from the response using a regex.
🚩 Flag Capture
Flag
Proof of Execution
🔧 Tools Used
Tool Purpose Python Exploit Caido Web Testing 
💡 Key Learnings
Skills Improved
- Binary Exploitation
- Reverse Engineering
- Web Exploitation
- Cryptography
- Forensics
- OSINT
- Miscellaneous
📚 References & Resources
Similar Challenges
Learning Resources
📊 Final Statistics
| Metric | Value | Notes | 
|---|---|---|
| Time to Solve | 00:01 | From start to flag | 
| Global Ranking (At the time of flag submission) | Challenge ranking | |
| Points Earned | 500 | Team contribution | 
Created: 21-02-2025 • Last Modified: 21-02-2025 *Author: mH4ck3r0n3 • Team: *
 
     
     
     
     
    