webhard

Knowledge Base

miptctf

Two Flask services: main app sends search results to internal censor via HTTP GET. Mode parameter has no length validation. Werkzeug URL length limit creates binary oracle: long text (found) triggers 414 error, short text (not found) succeeds. Error response bypasses XOR+SHA256, enabling character-by-character flag brute force.

$ ls tags/ techniques/
url_length_oraclebinary_search_bruteforceerror_based_oracle

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]