Contents

🌐 Hacking Skill Are Optional

A detailed write-up of the Web challenge 'Hacking Skill Are Optional' from RingZer0 CTF

/images/RingZer0CTF/HackingSkillAreOptional/challenge_presentation.png
Challenge Presentation

📊 Challenge Overview

Category Details Additional Info
🏆 Event RingZer0 CTF Event Link
🔰 Category Web 🌐
💎 Points 1 Out of 1 total
⭐ Difficulty 🟢 Easy Personal Rating: 1/10
👤 Author Breached Company Profile
🎮 Solves (At the time of flag submission) 344 solve rate
📅 Date 06-03-2025 RingZer0 CTF
🦾 Solved By mH4ck3r0n3 Team:

🎯 Challenge Files & Infrastructure

Provided Files

1
Files: None

🔍 Initial Analysis

First Steps

Initially, the website appears as follows:

/images/RingZer0CTF/HackingSkillAreOptional/site_presentation.png
Site Presentation

We are given a link (https://www.itgovernance.co.uk/blog/63-of-data-breaches-involve-weak-default-or-stolen-passwords) to an article that discusses data breaches caused by weak default passwords. Let’s move on to the exploitation phase.

🎯 Solution Path

Exploitation Steps

Exploitation

The first thing that came to my mind was to try accessing https://ringzer0ctf.com/login with default credentials. The most common ones are username=admin&password=admin.

/images/RingZer0CTF/HackingSkillAreOptional/admin_login.png
Admin Login

By trying to log in with these credentials and going to the Your Profile section (https://ringzer0ctf.com/user), I found the flag in the E-mail field.

Flag capture

/images/RingZer0CTF/HackingSkillAreOptional/manual_flag.png
Manual Flag

🛠️ Exploitation Process

Approach

The automatic exploit manually sets the PHPSESSID of the admin account, as automating the process fully becomes a bit tricky due to the csrf-token issue. After that, it makes a GET request to /user and extracts the flag from the response using a regex.

🚩 Flag Capture

Flag

Proof of Execution

/images/RingZer0CTF/HackingSkillAreOptional/automated_flag.png
Automated Flag
Screenshot of successful exploitation

🔧 Tools Used

Tool Purpose
Python Exploit

💡 Key Learnings

Skills Improved

  • Binary Exploitation
  • Reverse Engineering
  • Web Exploitation
  • Cryptography
  • Forensics
  • OSINT
  • Miscellaneous

📚 References & Resources

Learning Resources


📊 Final Statistics

Metric Value Notes
Time to Solve 00:01 From start to flag
Global Ranking (At the time of flag submission) 14059 / 51297 Challenge ranking
Points Earned 1 Team contribution

Created: 06-03-2025 • Last Modified: 06-03-2025 *Author: mH4ck3r0n3 • Team: *