<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Ctf on m7eesn blog</title>
    <link>https://blog.looter.dev/categories/ctf/</link>
    <description>Recent content in Ctf on m7eesn blog</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Sat, 01 Nov 2025 01:00:00 +0000</lastBuildDate>
    <atom:link href="https://blog.looter.dev/categories/ctf/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Subscriber – [Web] (Hard) - FlagYard</title>
      <link>https://blog.looter.dev/blog/2025-11-01-flagyard-subscriber-web-challenge/</link>
      <pubDate>Sat, 01 Nov 2025 01:00:00 +0000</pubDate>
      <guid>https://blog.looter.dev/blog/2025-11-01-flagyard-subscriber-web-challenge/</guid>
      <description>&lt;p&gt;Special thanks to &lt;strong&gt;#!SudoSqu!!d&lt;/strong&gt; for the SQLite extension loading tip!&lt;/p&gt;&#xA;&lt;h2 id=&#34;1-challenge-overview&#34;&gt;1. Challenge Overview&lt;/h2&gt;&#xA;&lt;h3 id=&#34;challenge-description&#34;&gt;Challenge Description&lt;/h3&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;&lt;em&gt;Join the l33ts and subscribe to our innocent shop.&lt;/em&gt;&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;p&gt;Subscriber is a web challenge from FlagYard featuring a Flask application with a deceptive vulnerability chain. The application offers email subscription and feedback submission functionality. At first glance, input validation and security controls appear to be in place, but multiple weaknesses combine to allow Remote Code Execution (RCE).&lt;/p&gt;</description>
    </item>
    <item>
      <title>Txen – [Web] (Medium) - FlagYard</title>
      <link>https://blog.looter.dev/blog/2025-10-25-flagyard-txen-web-challenge/</link>
      <pubDate>Sat, 25 Oct 2025 20:40:00 +0000</pubDate>
      <guid>https://blog.looter.dev/blog/2025-10-25-flagyard-txen-web-challenge/</guid>
      <description>&lt;h2 id=&#34;1-challenge-overview&#34;&gt;1. Challenge Overview&lt;/h2&gt;&#xA;&lt;h3 id=&#34;challenge-description&#34;&gt;Challenge Description&lt;/h3&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;&lt;em&gt;We proudly introduce our latest, completely impractical file-sharing service.&lt;/em&gt;&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;p&gt;Txen is a web exploitation challenge from FlagYard that presents a deceptively simple file-sharing application. Users can upload files through a straightforward endpoint. The catch? There&amp;rsquo;s an admin bot that visits user-provided URLs, and hidden somewhere in its browser session is a flag cookie we need to steal.&lt;/p&gt;&#xA;&lt;p&gt;At first glance, this seems straightforward—upload a malicious SVG, make the bot view it, exfiltrate the cookie. The reality is much trickier. The server has implemented a &lt;strong&gt;strict Content Security Policy&lt;/strong&gt; that blocks most traditional attack vectors. Our task: find a creative bypass that respects the CSP while still executing arbitrary JavaScript in the bot&amp;rsquo;s browser.&lt;/p&gt;</description>
    </item>
    <item>
      <title>OhMyQL – [Web] (Hard) - FlagYard</title>
      <link>https://blog.looter.dev/blog/2025-10-24-flagyard-ohmyql-web-challenge/</link>
      <pubDate>Fri, 24 Oct 2025 17:40:00 +0000</pubDate>
      <guid>https://blog.looter.dev/blog/2025-10-24-flagyard-ohmyql-web-challenge/</guid>
      <description>&lt;h2 id=&#34;challenge-overview&#34;&gt;Challenge Overview&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Category:&lt;/strong&gt; Web (GraphQL)&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Difficulty:&lt;/strong&gt; Hard&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Prompt:&lt;/strong&gt; “Are you aware of modern web technologies?”&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Goal:&lt;/strong&gt; Retrieve the &lt;code&gt;FLAG&lt;/code&gt; exposed by the GraphQL-enabled web service.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Download:&lt;/strong&gt; &lt;a href=&#34;https://blog.looter.dev/downloads/flagyard-oh-my-qL.zip&#34;&gt;download link&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;The service exposes a GraphQL endpoint on &lt;code&gt;/graphql&lt;/code&gt;, backed by a SQLite database and JSON Web Tokens (JWT) for authentication. A protected &lt;code&gt;/admin&lt;/code&gt; HTTP route returns the flag, but only if the caller supplies a JWT whose payload includes &lt;code&gt;{&amp;quot;flagOwner&amp;quot;: true}&lt;/code&gt;.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;reconnaissance--source-review&#34;&gt;Reconnaissance &amp;amp; Source Review&lt;/h2&gt;&#xA;&lt;p&gt;Static analysis of the application’s two back-end modules, &lt;code&gt;app/app/index.js&lt;/code&gt; and &lt;code&gt;app/app/database.js&lt;/code&gt;, reveals the entire execution flow:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Pooking [WEB] (Medium) - FlagYard</title>
      <link>https://blog.looter.dev/blog/2025-10-23-flagyard-pooking-web-challenge/</link>
      <pubDate>Thu, 23 Oct 2025 17:00:00 +0000</pubDate>
      <guid>https://blog.looter.dev/blog/2025-10-23-flagyard-pooking-web-challenge/</guid>
      <description>&lt;h2 id=&#34;1-challenge-overview&#34;&gt;1. Challenge Overview&lt;/h2&gt;&#xA;&lt;h3 id=&#34;challenge-description&#34;&gt;Challenge Description&lt;/h3&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;&lt;em&gt;Explore the cars world with Pooking.com&lt;/em&gt;&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;p&gt;Pooking is a web challenge from flagYard, it&amp;rsquo;s about car rental portal The front page is harmless, but the API that powers it exposes several JSON endpoints:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;POST /api/forgot-password&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;code&gt;POST /api/reset-password&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;code&gt;POST /api/login&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;code&gt;POST /api/book-car&lt;/code&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;The challenge is to obtain customer accounts (and ultimately the flag) without knowing any credentials up front. During recon we noticed that every request body we send is forwarded directly into MongoDB. That gives us the classic NoSQL-injection playground: if we embed operators such as &lt;code&gt;$regex&lt;/code&gt;, the server evaluates them instead of treating them as plain strings.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Kuwait Cyber League CTF (2025)</title>
      <link>https://blog.looter.dev/blog/2025-10-18-kuwait-cyber-league-ctf-2025/</link>
      <pubDate>Sat, 18 Oct 2025 09:00:00 +0000</pubDate>
      <guid>https://blog.looter.dev/blog/2025-10-18-kuwait-cyber-league-ctf-2025/</guid>
      <description>&lt;p&gt;My team and I participated in the Kuwait Cyber League CTF held on October 18, 2025. The competition featured a variety of challenges across multiple categories,&#xA;We unfortunately, did not secure the first place, however we managed to place 2nd overall, due to various factors including our main binary exploitation/reverse engineering expert not being able to participate due to personal reasons. We have solved 10 challenges out of the 14 available, which is respectable considering the technical challenges the platform were having.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Cybertalents - New Year Challenge (2025)</title>
      <link>https://blog.looter.dev/blog/2025-01-10-cybertalents-new-year-challenge-2025/</link>
      <pubDate>Fri, 10 Jan 2025 12:00:00 +0000</pubDate>
      <guid>https://blog.looter.dev/blog/2025-01-10-cybertalents-new-year-challenge-2025/</guid>
      <description>&lt;h1 id=&#34;new-year-challenge-2025--apple&#34;&gt;New Year Challenge 2025 » Apple&lt;/h1&gt;&#xA;&lt;p&gt;General Information / Basic / 25 (pts)&lt;/p&gt;&#xA;&lt;p&gt;FLAG Format: just the name of the malware&lt;/p&gt;&#xA;&lt;p&gt;Description:&lt;/p&gt;&#xA;&lt;p&gt;A malware that plagues MacOS devices, and relies on Flash updates and social engineering tactics in order to dupe victims into installing the malware on devices.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;p&gt;This challenge was an easy one few google searches and you find &lt;a href=&#34;https://www.zdnet.com/article/this-simple-malware-still-plagues-one-in-10-mac-users/&#34;&gt;This simple malware still plagues one in 10 Mac users&lt;/a&gt;,&lt;/p&gt;&#xA;&lt;p&gt;The flag is &lt;code&gt;Shlayer&lt;/code&gt;&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
