Skip to main content
  1. CTF Writeups/
  2. USC CTF Fall 2024/

Artventures

·
Web Flask Cookie Spoofing
subzcuber
Author
subzcuber
i like to imagine i’m funny

psst.. i found the secret key used by the Tommy’s Artventures flask server! our next mission shall be to heist the flag >:)

4a6282bf78c344a089a2dc5d2ca93ae6

this probably took me the longest

basically we are given the secret key for a flask server. what flask does is it creates a session cookie with a header.timestamp.signature form. The header is just standard data encrypted in base64, but the timestamp and signature are encrypted using the secret key

in the website, we were asked to first create an account, then login. Once in there was an option called curate, which was only for the admin user. So basically our goal was to forge a cookie to make the server think we were admin.

changing the header is really easy because it’s just base64, but it’s the signature part that’s difficulty.

thankfully i found this great resource

the above article provided a script to sign cookies exactly the same way that flask does it. going into the firefox and changing the contents of the cookie and then reloading did the trick :)

CYBORG{oce4n5_auth3N71ca7i0N}
Reply by Email

Related

iRobots
Web Robots.txt
robots.txt
Beer Sales
Osint Dorking Google Ftp
google dorking
Buildings
Osint Reverse-Lookup Tineye
image lookup