Writeup in progress
Currently making the solution for More Cookiesand the walkthrough will be published here as soon as it's ready.
Check back soon - or follow our latest updates on the homepage- to be notified when the full writeup goes live.
Currently making the solution for More Cookiesand the walkthrough will be published here as soon as it's ready.
Check back soon - or follow our latest updates on the homepage- to be notified when the full writeup goes live.
Want more picoCTF 2021 writeups?
Use an automated credential stuffing attack with a leaked credentials dump to gain access to a user account and capture the flag.
Bypass a time-window rate limit on a login page by sleeping 30 seconds after lockout, then credential stuffing to capture the flag.
Profile URLs use MD5 hashes of user IDs. Enumerate IDs near 3000 to find the admin (ID 3019) and read the flag.
Two-factor authentication is enforced on login, but a leaked TOTP secret in the page source lets you generate a valid code and bypass it.
The server uses geo-based routing to restrict access to Iceland. Configure Tor to use Iceland exit nodes and route your request through them.