<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Cyber Apocalypse CTF on s4yhii&#39;s blog</title>
    <link>https://blog.s4yhii.com/categories/cyber-apocalypse-ctf/</link>
    <description>Recent content in Cyber Apocalypse CTF on s4yhii&#39;s blog</description>
    <image>
      <title>s4yhii&#39;s blog</title>
      <url>https://blog.s4yhii.com/%3Clink%20or%20path%20of%20image%20for%20opengraph,%20twitter-cards%3E</url>
      <link>https://blog.s4yhii.com/%3Clink%20or%20path%20of%20image%20for%20opengraph,%20twitter-cards%3E</link>
    </image>
    <generator>Hugo -- 0.155.3</generator>
    <language>en-us</language>
    <lastBuildDate>Tue, 25 Mar 2025 08:00:00 -0500</lastBuildDate>
    <atom:link href="https://blog.s4yhii.com/categories/cyber-apocalypse-ctf/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Cyber Apocalypse 2025 - 6x Web Challenges Writeup</title>
      <link>https://blog.s4yhii.com/posts/cyberapocalypse-ctf2025-web/</link>
      <pubDate>Tue, 25 Mar 2025 08:00:00 -0500</pubDate>
      <guid>https://blog.s4yhii.com/posts/cyberapocalypse-ctf2025-web/</guid>
      <description>&lt;p&gt;I participated as a member of team &lt;strong&gt;CibersecUNI&lt;/strong&gt;. This time i managed to solve all 6/6 challenges in the web category.&lt;/p&gt;
&lt;h1 id=&#34;whispers-of-the-moonbeam&#34;&gt;Whispers of the Moonbeam&lt;/h1&gt;
&lt;p&gt;Observando las funciones, nos dan una pista que se puede inyectar comandos con ;.&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;alt text&#34; loading=&#34;lazy&#34; src=&#34;https://raw.githubusercontent.com/s4yhii/s4yhii.github.io/master/assets/images/CA2025/image-1.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;Usando el comando gossip, puedo listar los archivos, se visualiza el archivo flag.txt, y con un simple ; puedo concatenar el comando cat para leer la flag.&lt;/p&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;gossip&lt;span class=&#34;p&#34;&gt;;&lt;/span&gt; cat flag.txt
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Obtenemos la flag. 🎉
HTB{Sh4d0w_3x3cut10n_1n_Th3_M00nb34m_T4v3rn_78cb9b70be3bf077e608865b967b5ab1}&lt;/p&gt;</description>
    </item>
    <item>
      <title>Cyber Apocalypse 2024 - 4x Web Challenges Writeup</title>
      <link>https://blog.s4yhii.com/posts/2024-03-14-cyberapocalypse-ctf2024-web/</link>
      <pubDate>Thu, 14 Mar 2024 08:00:00 -0500</pubDate>
      <guid>https://blog.s4yhii.com/posts/2024-03-14-cyberapocalypse-ctf2024-web/</guid>
      <description>&lt;p&gt;I participated as a member of team &lt;strong&gt;CibersecUNI&lt;/strong&gt;. In the web category we solved 6/9 challenges as a team. In this writeup I will go through the ones that I have solved:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#testimonial&#34;&gt;Testimonial&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#labyrinth-linguist&#34;&gt;Labyrinth Linguist&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#timekorp&#34;&gt;TimeKORP&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#locktalk&#34;&gt;Locktalk&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h1 id=&#34;testimonial&#34;&gt;Testimonial&lt;/h1&gt;
&lt;p&gt;As the leader of the Revivalists you are determined to take down the KORP, you and the best of your faction&amp;rsquo;s hackers have set out to deface the official KORP website to send them a message that the revolution is closing in.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Cross Site Scripting (XSS)</title>
      <link>https://blog.s4yhii.com/posts/2022-05-10-cross-site-scripting-xss/</link>
      <pubDate>Wed, 18 May 2022 12:00:00 -0400</pubDate>
      <guid>https://blog.s4yhii.com/posts/2022-05-10-cross-site-scripting-xss/</guid>
      <description>&lt;p&gt;Cross-site scripting known as XSS is a web vulnerability in which malicious scripts are injected int benign and trusted websites. XSS occur when an attacker send malicious code in any user input fields in a browser to a different end-user.&lt;/p&gt;
&lt;h2 id=&#34;mechanisms&#34;&gt;Mechanisms&lt;/h2&gt;
&lt;p&gt;In an XSS attack the attacker inject script in HTML code so you&amp;rsquo;ll have to know javascript and HTML syntax, wbe uses scripts to control client-side application logic and make the website interactive, for example this script generates &lt;em&gt;Hello!&lt;/em&gt; pop-up on the web page:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Cyber Apocalypse 2023 2x Web Challenges Writeup</title>
      <link>https://blog.s4yhii.com/posts/2022-05-19-htb-cyber-apocalypse-ctf-web-writeups/</link>
      <pubDate>Wed, 18 May 2022 12:00:00 -0400</pubDate>
      <guid>https://blog.s4yhii.com/posts/2022-05-19-htb-cyber-apocalypse-ctf-web-writeups/</guid>
      <description>&lt;h1 id=&#34;kryptos-support&#34;&gt;Kryptos Support&lt;/h1&gt;
&lt;p&gt;Checking the web page of this challenge gives a form to send an issue and an admin will review that issue.
&lt;img loading=&#34;lazy&#34; src=&#34;https://raw.githubusercontent.com/s4yhii/s4yhii.github.io/master/assets/images/htb/ctf/ctf1.jpg&#34;&gt;&lt;/p&gt;
&lt;p&gt;So its interesting, maybe the admin will click in that issue and we can inject some kind of payload, like an stored xss, these approach is similar to the bankrobber box in htb.&lt;/p&gt;
&lt;p&gt;So we can craft the payload to steal the cookie of the admin or the user who will review out ticket.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
