webProhard
Knowledge Base
miptctf
Two Flask services: main app sends search results to internal censor via HTTP GET. Mode parameter has no length validation. Werkzeug URL length limit creates binary oracle: long text (found) triggers 414 error, short text (not found) succeeds. Error response bypasses XOR+SHA256, enabling character-by-character flag brute force.
$ ls tags/ techniques/
url_length_oraclebinary_search_bruteforceerror_based_oracle
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Photo Storage— miptctf
- [web][Pro]wait— bluehensctf
- [web][free]Offlinea— HackTheBox
- [web][Pro]В поисках капибары — Hackerlab— hackerlab
- [web][Pro]Museum— hackerlab