NarutoKeeper - Securinets CTF Quals 2022

tl;dr Create a note with meta redirect tag to get callback. Leak the flag using search functionality. ...

<span title='2022-04-14 10:57:25 +0000 UTC'>April 14, 2022</span>&nbsp;·&nbsp;4 min&nbsp;·&nbsp;ma1f0y

Vulpixelize - HITCON CTF 2021

tl;dr Use DNS Rebinding attack to read flag from /flag endpoint. ...

<span title='2021-12-05 21:24:04 +0000 UTC'>December 5, 2021</span>&nbsp;·&nbsp;3 min&nbsp;·&nbsp;Yadhu Krishna M

Shisui - Fword CTF 2021 Write-up

tl;dr XSS using DOM Clobbering <a id="showInfos"></a><a id="SETTINGS" name=check data-timezone="aaa" data-location="eval(window.name)"><a id="SETTINGS" name="x"> Bypass CSRF protection to execute XSS and read flag. ...

<span title='2021-08-30 00:00:00 +0000 UTC'>August 30, 2021</span>&nbsp;·&nbsp;3 min&nbsp;·&nbsp;Yadhu Krishna M

InCTF Internationals 2021 - MD-Notes Write-up

tl;dr Leak admin’s hash using wildcard target origin in postMessage or by calculating sha256(''). Create an XSS payload to read /api/flag and send it to attacker server. ...

<span title='2021-08-15 12:01:43 +0000 UTC'>August 15, 2021</span>&nbsp;·&nbsp;3 min&nbsp;·&nbsp;Yadhu Krishna M

Exploiting Client-side Prototype Pollution - arg.js

First of all, a big shoutout to the challenge author. All the challenges in this set are available here. Analysis Going through the challenge source, we can see that two JavaScript files are imported. 1 2 <script src="https://raw.githack.com/stretchr/arg.js/master/dist/arg-1.4.js"></script> <script src="js/main.js"></script> arg-1.4.js is a popular library for parsing URL parameters. And main.js has the following content. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 let data = { small: "Hi, there!...

<span title='2021-06-22 01:23:33 +0000 UTC'>June 22, 2021</span>&nbsp;·&nbsp;2 min&nbsp;·&nbsp;Yadhu Krishna M