More byte mean more secure
Although this is a web challenge, the script is ran directly with PHP because it doesn't need to have an HTML website attached. Run the command below to connect!
JSONP is a old pattern for getting data into JS, but I heard it's insecure because an attacker can specify code instead of a function name. I solved this problem by not letting you change the name.
For this challenge you will need to submit a URL to the admin bot (a program that runs a browser and directs it to visit your URL, simulating a real person clicking your link). I recommend learning how to use ngrok if you don't know how to expose local solutions to the internet - I've also provided a template server using Python and Flask for your solution.
The admin's cookie is set with SameSite=None
Check out my new note service! It supports all the formatting you'll ever need.
Flag is in admin's cookies.
I ran into this awesome NodeJS spreadsheet library using some custom sandboxing so I tried it out. I even hardened it a bit more. Nothing could ever go wrong
I've written a program that let's you encrypt and decrypt strings, but it uses a proprietary closed-source SDK through GitHub Actions. Of course you can fork it and only the magical GitHub black box will be able to see it. So there's no way you could dump the entire SDK... right?
Note: this challenge uses a non-standard flag format, irisCTF{}.
Also after solving, please delete your repository if you fork and make any changes to it so others can't cheat off of your repo.
Hint: this is not a rev challenge. No need to break IDA out for this one.
Classic bug combo pack
Admin will visit your URL after logging in.
What does it truly mean to sanitize something? What is a sanitize? Is this challenge solvable?
Admin bot code is provided, running Chromium at least 109.0