My team, HCS (Heroes Cyber Security), as the cybersecurity community team from the Institut Teknologi Sepuluh Nopember (ITS), has participated in the MetaRed Argentina-TIC CTF 2024, which was hosted by CERTUNLP (CSIRT académico de la Universidad Nacional de La Plata).
We managed to secured 3rd place of 205 teams, thank you for my mentor @daffainfo who's had participate with me to solve the website challenge.
Exploit local first! You have the source code
https://siem.ctf.cert.unlp.edu.ar
Source : siem.zip
Bypass internal host, with redirection.
Got a website like this.
Since we got the source-code, we can analyze it.
See for the domain regex, which is can be bypassed like this intranet.ctf.cert.unlp.edu.ar.yourwebsite.com
.
Because i don't have any host, we use alternative approach using @
according to this reference.
Make a request, then intercept it with Burpsuite.
Then we got flag on header.
Went through Google. First try to exploit local! You have the source code attached.
https://googler.ctf.cert.unlp.edu.ar
Source : googler.zip
SSRF + Open Redirect on Google.
First of all we need check the source-code.
We can do SSRF but there the requirement:
It easily when you already have host domain, but for me little bit hard :joy: .
But for that i already have solution like this
How do to that?
Well i just found similar challenge SURFING, then i got the googleads domain for the first part.
After that we use https://google.com/url?q=
since we can modify the protocol after q
parameter, because when i use google.com/amp/s/
it directly to https which is error because the flag was on http protocol.
The problem is, if we use that we need verify usg
and ust
from Google, for the solution we can use Gmail source like this reference.
All the payload is ready then just validate it.
You know, just hack the admin cookie. Exploit local first! Try in Google Chrome, Firefox is not vulnerable
https://tokyo.ctf.cert.unlp.edu.ar
Source : tokyo.zip
SSRF + window.open redirection
Got a website like this.
Then we try to analyze the website source-code.
Since there a bot feature, i was concern this was XSS Vulnerable.
But those replace function it was not possible to do XSS (at least for me).
But those innerHTML of eval function is make me curious.
Then i checked the bot feature if we can do SSRF on other host, check with my webhook.
Well, we got the pingback, that's mean we can host our website with get cookie inside to obtain the flag.
Since i don't have any host, i just edit the landing page of my webhook with this script.
Validate on the bot, and we got the flag.