Method in the Madness
Writeup for Method in the Madness (Web) - NahamCon CTF (2025) π
Description
HackingHub has provided this CTF challenge!
Solution
The homepage has 6 checkboxes, that we can't click. There's a hint that we should checkout this page.
Let's check the JS.
There's a GET request to /poll and sure enough, if we check the HTTP history in burp we see lots of requests, all returning false.
Tried changing it to a JSON POST request and updating all the values to true, but it failed to update the values. Also tried removing disabled="" from each of the checkbox properties and manually ticking all of them.
Realised there is another endpoint /interesting which just says hello on the page. After visiting this page, I discovered that box_1 and box_2 are now ticked π€
My instance timed out and the second time around I went straight to /interesting and back to the homepage. The first box is ticked, so what is the pattern? How did the second box get checked last time?
Ah OK, I change the request method to POST on the /interesting endpoint and the second box is now checked! I try the OPTIONS method and box_5 is ticked. We have 3 more to go π
Tried various HTTP methods, eventually ticked the remaining boxes with:
PATCH
PUT
DELETE
We hit the /poll endpoint again and get the flag!
Flag: flag{bd399cb9c3a8b857588d8e13f490b6fd}
Last updated