webeasy

Flag Admin v1

web-kids20

Task: Page requires X-Custom-Object header and solving a challenge-response protocol with modular exponentiation. Solution: Send custom header via Burp Suite, deobfuscate admin.js to understand the protocol, bruteforce gamma/beta values satisfying pow(gamma, beta) mod 31337 == challenge.

$ ls tags/ techniques/
js_deobfuscationcustom_header_injectionmodpow_bruteforce

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]