Method in the Madness
Writeup for Method in the Madness (Web) - NahamCon CTF (2025) 💜
Last updated
Writeup for Method in the Madness (Web) - NahamCon CTF (2025) 💜
Last updated
HackingHub has provided this CTF challenge!
The homepage has 6 checkboxes, that we can't click. There's a hint that we should checkout this page
.
Let's check the JS.
There's a GET request to /poll
and sure enough, if we check the HTTP history in burp we see lots of requests, all returning false.
Tried changing it to a JSON POST request and updating all the values to true, but it failed to update the values. Also tried removing disabled=""
from each of the checkbox properties and manually ticking all of them.
Realised there is another endpoint /interesting
which just says hello
on the page. After visiting this page, I discovered that box_1
and box_2
are now ticked 🤔
My instance timed out and the second time around I went straight to /interesting
and back to the homepage. The first box is ticked, so what is the pattern? How did the second box get checked last time?
Ah OK, I change the request method to POST
on the /interesting
endpoint and the second box is now checked! I try the OPTIONS
method and box_5
is ticked. We have 3 more to go 🙏
Tried various HTTP methods, eventually ticked the remaining boxes with:
PATCH
PUT
DELETE
We hit the /poll
endpoint again and get the flag!
Flag: flag{bd399cb9c3a8b857588d8e13f490b6fd}