Description
Try here to find the flag
Setup
Burp proxy
Launch Burp Suite Community Edition (or your preferred MITM proxy) and its embedded browser.
Browse to the provided URL (http://titan.picoctf.net:<PORT_FROM_INSTANCE>/) through the proxy.
http://titan.picoctf.net:<PORT_FROM_INSTANCE>/
Solution
- Step 1Register with dummy dataFill out the first form with any values and submit. This leads to the OTP verification page.
- Step 2Intercept the OTP submissionTurn Intercept ON in Burp, enter any OTP, and submit. In the captured request, locate the otp= parameter and remove the value so it reads simply otp=.(Intercepted request body) ...&otp=&...
- Step 3Forward the tampered requestForward the modified request to the server. Because the OTP is blank, the response contains the flag immediately.
Flag
picoCTF{#0TP_Bypvss_SuCc3$S_3e3d...}
Tampering with the OTP parameter yields the flag immediately.