DamoNeer@home:~$

dCTF 2021 - Very secure website | Web

Very secure website

Some students have built their most secure website ever. Can you spot their mistake?

http://dctf1-chall-very-secure-site.westeurope.azurecontainer.io/

Solution

image

Clicking the source code gives the following:

image

There is php code vulnerability about using the operators “!=” and “==”.

The “51c3f5f5d8a8830bc5d8b7ebcb5717df” hash is easy to figure out. With a simple Google search, it’s revealed to be “admin”. The password requires a bit more research.

Long story short, it turns out I don’t need to find out the identity of the tiger128,4 hash: “0e132798983807237937411964085731”.

I just need to use one of the “magic hashes” which also begin with 0e or 00e and I just need to pass that on as the password.

image

image