Biocorp
Writeup for BioCorp (Web) - 1337UP LIVE CTF (2024) π
Video Walkthrough
Challenge Description
BioCorp contacted us with some concerns about the security of their network. Specifically, they want to make sure they've decoupled any dangerous functionality from the public facing website. Could you give it a quick review?
Solution
Players will find a basic website, without much functionality.
The challenge includes source code, so let's check it. One thing that stands out immediately is a hidden control panel, only accessible when using a VPN-related header and IP.
We can use the match and replace function in burp to insert the header in all of our requests, or we could use a curl command.
Now we can access the panel.
So, what does the panel do? It displays the XML data from the nuclear equipment. However, it also accepts data via a POST request.
Classic XXE vulnerability, we can send something like this to receive the flag.
Alternatively, automated the whole process into a solve script.
solve.py
Flag: INTIGRITI{c4r3ful_w17h_7h053_c0n7r0l5_0r_7h3r3_w1ll_b3_4_m3l7d0wn}
Last updated
