webhard
Knowledge Base
miptctf
Two Flask services: main app sends search results to internal censor via HTTP GET. Mode parameter has no length validation. Werkzeug URL length limit creates binary oracle: long text (found) triggers 414 error, short text (not found) succeeds. Error response bypasses XOR+SHA256, enabling character-by-character flag brute force.
$ ls tags/ techniques/
url_length_oraclebinary_search_bruteforceerror_based_oracle
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]