Security Forem

Hitanshu Gedam
Hitanshu Gedam

Posted on

picoCTF Irish-name-repo 3 writeup

In this challenge we are given a basic website and are asked to bypass the admin login:

webpage

Let's go to the admin login page:

admin login

We are greeted with a login page:

admin portal

I went to the Inspect element via right clicking the webpage. We can see the source code in the Elements tab. We see there is a debud hidden feature with value set to 0, I change it to 1 and enter 'admin' as the password:

admin entered

login failed

Here we can see that 'admin' changes to 'nqzva'. We find a shift value of
13 between these two which suggests to me that it was a ROT13 cipher.

I head over to Cryptii, choose to encode a simple SQL injection payload that I intend to use ' or 1=1; --. We get the ciphertext as ' be 1=1; --

cryptii

I use that ciphertext to bypass the login and there we have our flag:

flag received

Top comments (0)