Bluhens CTF-2024

Web Challanges

Web Intro:

In the challenge index page, it is stated that the developer learned from Solar Flare to use version control.

circle-info

In the hint of using version control used in the application, I decided to check for .git leak in this challange.

While checking the layout of the git repository https://git-scm.com/docs/gitrepository-layoutarrow-up-right.

It Will confirms that application default git branch is to be a master.

While checking for the git logs.

Again application throws 403 Forbidden error.

While checking the HEAD file.

Application throws the Commit id with the comments.

Using Git-dumper arrow-up-righttool to clone the files to local.

Locating the /.git/ directory.

ref: https://git-scm.com/docsarrow-up-right

Extracting the commit.

Decrypt the Password 1c63129ae9db9c60c3e8aa94d3e00495

DNS:

The application will provide the flag only your dig from the 127.0.0.1.

Flag : UDCTF{sp00fing_5ucc3ss_127_0_0_1_f728bf}

Last updated