Contents

OS CTF 2024 Writeup

I managed to solve 6 challenges.

Misc

Cyber Quiz

Description

Click to show the desc

My teacher assigned me this quiz and told me that I have to answer each question correctly otherwise I won’t be able to pass the test. Can you help me? Pwease

Author: @5h1kh4r

nc 34.16.207.52 12345

Solve Walkthrough

  • Just answer all the questions after making a connection.
  • ChatGPT was helped me a lot. 😂

/images/os-ctf_misc1-01.png

Flag

Click to show the flag
OSCTF{L33t_Kn0wl3Dg3}

OSINT

The statue is being repaired

Description

Click to show the desc

This statue is typical of an university, can you find out the name of the statue and the city where it exists?

Format flag: OSCTF{name of statue_city}

If the name of the statue is Statue of Liberty at New York, US, the flag will be: OSCTF{statueofliberty_newyork}

/images/os-ctf_osint1-01.png

Solve Walkthrough

  • Save the picture chall and try to search with Google Lens. You will find 2 posts in Facebook (in Vietnam language).

/images/os-ctf_osint1-02.png

  • The image looks same, and then I explore the tag in the post #FPTAround.
  • Seems like it refers to the FPT University in Vietnam.

/images/os-ctf_osint1-03.png

/images/os-ctf_osint1-04.png

  • I try to translate what is the Intro description.

/images/os-ctf_osint1-05.png

/images/os-ctf_osint1-06.png

  • Finally, we can crafting the correct flag format: selfmademan_hochiminh.

Flag

Click to show the flag
OSCTF{selfmademan_hochiminh}

Web

1. Introspection

Description

Click to show the desc

Welcome to the Secret Agents Portal. Find the flag hidden in the secrets of the Universe !!!

Author: @5h1kh4r

Web Instance: http://34.16.207.52:5134

Solve Walkthrough

  • Visit the web page, and open the inspect element in web browser.

/images/os-ctf_web1-01.png

  • Notice that the web page have JS file embedded. Open the script.js file and yeah.. we found the flag.

script.js

function checkFlag() {
  const flagInput = document.getElementById('flagInput').value;
  const result = document.getElementById('result');
  const flag = "OSCTF{Cr4zY_In5P3c71On}";
  
  if (flagInput === flag) {
    result.textContent = "Congratulations! You found the flag!";
    result.style.color = "green";
  } else {
    result.textContent = "Incorrect flag. Try again.";
    result.style.color = "red";
  }
}
  • Check the flag for make sure. Sooo… ez dude.

/images/os-ctf_web1-02.png

Flag

Click to show the flag
OSCTF{Cr4zY_In5P3c71On}

2. Heads or Tails

Description

Click to show the desc

pfft .. Listen, I’ve gained access to this login portal but I’m not able to log in. The admins are surely hiding something from the public, but … I don’t understand what. Here take the link and be quiet, don’t share it with anyone

Author: @5h1kh4r

Web instance: http://34.16.207.52:3635/

Solve Walkthrough

  • From the title we know that the challenge is the web app vulnerable to SQL injection attack.
  • Just performing basic SQL injection payload to bypass login: 1' OR 1=1--.
  • Use the payload in username and password and it will make the username and password val0id. 4. In the default page, it will show the fake flag. You must be careful okay.

/images/os-ctf_web2-01.png

  • But, you can access the admin page directly by changing the endpoint to /admin (if you know).

/images/os-ctf_web2-02.png

  • If you don’t know what all endpoints or subdirectories inside the web page, you can do directory scanning using tool like dirsearch, feroxbuster, dirb, or gobuster. I recommend to use dirsearch cause they have default wordlist.

Flag

Click to show the flag
OSCTF{D1r3ct0RY_BrU7t1nG_4nD_SQL}

3. Indoor WebApp

Description

Click to show the desc

The production of this application has been completely indoor so that no corona virus spreads, but that’s an old talk right?

Author: @5h1kh4r

Web Instance: http://34.16.207.52:2546

Solve Walkthrough

  • Given a web app that we can see personal information, but notice that every person is have unique id: ?user_id value parameters.

/images/os-ctf_web3-01.png

  • I try to change it to person 2 or ?user_id=2 and I got the flag.

/images/os-ctf_web3-02.png

  • We can perform brute force attack to check if the spesific user_id is exist or not by using Burp Suite or simply cURL (combined with for/while loop).

/images/os-ctf_web3-03.png

  • Luckily, we just have 3 available users.

Flag

Click to show the flag
OSCTF{1nd00r_M4dE_n0_5enS3}

4. Action Notes

Description

Click to show the desc

I have created this notes taking app so that I don’t forget what I’ve studied

Author: @5h1kh4r

Web Instance: http://34.16.207.52:8965

Solve Walkthrough

  • I just try to login as admin and luckily the password that I guess is admin123 so I can the flag in the admin page.

/images/os-ctf_web4-01.png

  • Try to guess common admin passwords, such as:
Username Password
admin admin
admin password
admin admin123
admin admin1234

Flag

Click to show the flag
OSCTF{Av0id_S1mpl3_P4ssw0rDs}