Securinets Friendly 2022

Welcome

NFT Marketplace

JW token

LoGic?

preg_replace() in php replaces only once.

Request basics 1

Request basics 2

Request basics 3

Web Crawler

COOOOOOOOkiiie

all you have to do is to delete the Cookie

Then, decode with cyberchef (online website)

XXdirect

You should notice that the Url changes from XXdirect.ctf.securinets.tn to redirect.ctf.securinets.tn

all you have to do is to see raw response from the first url

Halt and Catch Fire

Some players were trying to deobfuscate JS and ended up with a single part of the flag, that’s nice but the intended solution is to expose players to Browser debug mode.

Tunisia

The least solved one,

You should notice that whatever input in placeholder1 param gets injected in html code.

I already gave you the format of the injection with the attribute id=”placeholder2” to modify : all you have to do is to google how js is interacting with html and thus you’ll find the known js method : getElementById

Searching in Tunisia.js, you’ll find that if the div element isn’t “map”, there will be a console logging of the char “-“

solution : web.ctf.securinets.tn:7005/?placeholder1=

with base 64 decoding the secret is : GetElEmeNtById

flag : Securinets{GetElEmeNtById}

Last updated

Was this helpful?