Tags: web 

Rating:

# Under Development

![](img/chall.png)

Challenge [Link](http://3.142.122.1:8885/)

![](img/1.png)

Let's check the source.

![](img/2.png)

They are saying about cookie, there is a session cookie named `privilege` is storing.

![](img/3.png)

It's base64 encoded string, once we decoded we get `user`

![](img/4.png)

What i did here, encoded `admin` to base64 string, that is `YWRtaW4=`. Because admin has more privilege than user.

![](img.5.png)

So let's edit and send the request using browser `Network Monitor`.
change cookie value to base64 encoded string of `admin`.

![](img/6.png)

From the responce tab we will get our flag.

![](img/flag.png)

```SHELL{0NLY_0R30_8e1a91a632ecaf2dd6026c943eb3ed1e}```

Original writeup (https://github.com/an0n4ce/CTF-Write-Ups/tree/master/SHELL-CTF-21/Under%20Development/README.md).