Rating: 5.0

# Web

## Swaggy
Category: Web
Difficulty: Easy

Description:
This API documentation has all the swag

### Solve
![image](Swaggy/1.png)

There is a weak password here, admin, admin

![image](Swaggy/2.png)

flag{e04f962d0529a4289a685112bf1dcdd3}

---

## Confidentiality
Category: Web
Difficulty: Easy

Description:
My school was trying to teach people about the CIA triad so they made all these dumb example applications... as if they know anything about information security. Can you prove these aren't so secure?

### Solution
![image](Confidentiality/1.png)

It is a command injection.

---

## Integrity
Category: Web
Difficulty: Medium

Description:
My school was trying to teach people about the CIA triad so they made all these dumb example applications... as if they know anything about information security.

Supposedly they learned their lesson and tried to make this one more secure. Can you prove it is still vulnerable?

### Solution
![image](Integrity/1.png)

Command injection bypass filter \n

I have used MaxHackbar addon for this challenge.After installing this addon/extension,the steps is as under:
1) You need to click on Load URL first to load the URL.
2) You need to type file=\ncat flag.txt as your post data to get the contents of the flag.txt file. And hence you will get the flag.

command injection cheatsheet: https://hackersonlineclub.com/command-injection-cheatsheet/

---

## OPA Secrets
Category: Web
Difficulty: Hard

Description:
OPA! Check out our new secret management service

### Solution
This is a code audit challenge.
After we look around the website, we find source code of the website.

![image](OPA_Secrets/1.png)

The flag is hidden in the secret. We may use the secret id to get the flag.

![image](OPA_Secrets/2.png)

The getValue function will return the value of secrete.

![image](OPA_Secrets/3.png)

The get secret function will return value without check user session id.

![image](OPA_Secrets/4.png)

We make up the post and change the secret id to get the flag

***flag{589882d62d1c899d8b85db1af2076b39}***

Original writeup (https://github.com/todd-tao/CTF-WriteUps/tree/main/H%40cktivityCon_2021_CTF/Web).