Skip to main content

82 docs tagged with "Web"

Includes write-ups on the topic of Web

View all tags

002

- Description//momo.hackmyvm.eu/ch4ll3ng3002/

014

- Description//momo.hackmyvm.eu

018

- Description//momo.hackmyvm.eu/ZiP004JfyGh/

020

- Description//momo.hackmyvm.eu/li0nsg3l9vhhe/

024

- Description//momo.hackmyvm.eu/XXXll3ng324

027

- Description//momo.hackmyvm.eu/t0r1k34s3/

042

- Description//momo.hackmyvm.eu/n1lsfr4hm/

050

- Description//momo.hackmyvm.eu/0r1g04szt0p/

API - Broken Access

- Description: Your friend has set up a platform where you can register and post a private note.

Apriti sesamo

- Description: I found a web app that claims to be impossible to hack!

Bookmarklet

- Description: Why search for the flag when I can make a bookmarklet to print it for me?

cookie

- Description: 쿠키로 인증 상태를 관리하는 간단한 로그인 서비스입니다.

Cookie Monster Secret Recipe

- Description: Cookie Monster has hidden his top-secret cookie recipe somewhere on his website. As an aspiring cookie detective, your mission is to uncover this delectable secret. Can you outsmart Cookie Monster and find the hidden recipe?

Cookies

- Description: Who doesn't love cookies? Try to figure out the best one.

Crack the Gate 1

- Description: We're in the middle of an investigation. One of our persons of interest, ctf player, is believed to be hiding sensitive data inside a restricted web portal.

Crack the Gate 2

- Description: The login system has been upgraded with a basic rate-limiting mechanism that locks out repeated failed attempts from the same source.

devtools-sources

- Description: 개발자 도구의 Sources 탭 기능을 활용해 플래그를 찾아보세요.

findme

- Description: Help us test the form by submiting the username as test and password as test!

Flag Command

- Description: Embark on the "Dimensional Escape Quest" where you wake up in a mysterious forest maze that's not quite of this world.

flags are stepic

- Description: A group of underground hackers might be using this legit site to communicate. Use your forensic techniques to uncover their message

GET aHEAD

- Description: Find the flag being held on this server to get ahead of the competition

GitLab CVE-2023-7028

- Description: Learn to exploit a GitLab instance using CVE-2023-7028 and understand various mitigation techniques.

head-dump

- Description: Welcome to the challenge! In this challenge, you will explore a web application and find an endpoint that exposes a file containing a hidden flag.

HTML - disabled buttons

- Description: This form is disabled and can not be used. It's up to you to find a way to use it.

HTTP - Headers

- Description: Get an administrator access to the webpage.

HTTP - Open redirect

- Description: Find a way to make a redirection to a domain other than those showed on the web page.

HTTP - POST

- Description: Find a way to beat the top score!

Hunter

- Description: CTF. Have Fun.

Includes

- Description: Can you get the flag?

Insp3ct0r

- Description: Kishor Balan tipped us off that the following code may need inspection

It is my Birthday

- Description: I sent out 2 invitations to all of my friends for my birthday!

JWT - Weak secrets

- Description: This API with its /hello endpoint (accessible with GET) seems rather welcoming at first glance but is actually trying to play a trick on you.

logon

- Description: The factory is hiding things from all of its users. Can you login as Joe and find what they've been looking at?

n0s4n1ty 1

- Description: A developer has added profile picture upload functionality to a website. However, the implementation is flawed, and it presents an opportunity for you. Your mission, should you choose to accept it, is to navigate to the provided web page and locate the file upload area. Your ultimate goal is to find the hidden flag located in the /root directory.

OpenSecret

- Description: A simple help desk portal where users can submit support tickets. The application uses JWT tokens for session management, but something seems off about how they're implemented. Can you find the security flaw?

Pickle Rick

- Description: A Rick and Morty CTF. Help turn Rick back into a human!

picobrowser

- Description: This website can be rendered only by picobrowser, go and catch the flag!

ReactOOPS

- Description: NexusAI's polished assistant interface promises adaptive learning and seamless interaction.

RootMe

- Description: A ctf for beginners, can you root me?

Scavenger Hunt

- Description//mercury.picoctf.net:27278/. Can you find it?

Search source

- Description: The developer of this website mistakenly left an important artifact in the website source, can you find it?

Secrets

- Description: We have several pages hidden. Can you find the one with the flag?

SOAP

- Description: The web project was rushed and no security assessment was done. Can you read the /etc/passwd file?

Spookifier

- Description: There's a new trend of an application that generates a spooky name for you.

SSTI1

- Description: I made a cool website where you can announce whatever you want! Try it out!

Unminify

- Description: I don't like scrolling down to read the code of my website, so I've squished it. As a bonus, my pages load faster!

WebDecode

- Description: Do you know how to use the web inspector?