webeasy
Flag Admin v1
web-kids20
Task: Page requires X-Custom-Object header and solving a challenge-response protocol with modular exponentiation. Solution: Send custom header via Burp Suite, deobfuscate admin.js to understand the protocol, bruteforce gamma/beta values satisfying pow(gamma, beta) mod 31337 == challenge.
$ ls tags/ techniques/
js_deobfuscationcustom_header_injectionmodpow_bruteforce
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]