webProhard
original_task
miptctf
Task: Web app with notes, two Flask backends (DEV/PROD) behind nginx, flag only on PROD via localhost, bot restricted to ports 443/4443. Solution: DNS HTTPS/SVCB record attack (RFC 9460) to redirect browser TCP connection to port 1337 while URL shows port 443, bypassing bot port check.
$ ls tags/ techniques/
flaskssrffirefoxplaywrightnginxdns_https_recordsvcbrfc9460port_bypassdns_manipulationhttp2self_signed_certbrowser_ssrf
dns_https_svcb_port_redirectionbrowser_ssrf_via_dnsform_autosubmit_posturl_tcp_port_mismatch
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Board of Secrets Revenge— miptctf
- [web][Pro]Simple Web (d5c47306-5d4f-4ad4-958f-5414a0b85b9b)— hackerlab
- [web][free]Six-Seven— alfactf
- [web][Pro]board_of_secrets— miptctf
- [network][free]offknock— umdctf