<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Ctf on s4yhii&#39;s blog</title>
    <link>https://blog.s4yhii.com/tags/ctf/</link>
    <description>Recent content in Ctf on s4yhii&#39;s blog</description>
    <image>
      <title>s4yhii&#39;s blog</title>
      <url>https://blog.s4yhii.com/%3Clink%20or%20path%20of%20image%20for%20opengraph,%20twitter-cards%3E</url>
      <link>https://blog.s4yhii.com/%3Clink%20or%20path%20of%20image%20for%20opengraph,%20twitter-cards%3E</link>
    </image>
    <generator>Hugo -- 0.155.3</generator>
    <language>en-us</language>
    <lastBuildDate>Tue, 25 Mar 2025 08:00:00 -0500</lastBuildDate>
    <atom:link href="https://blog.s4yhii.com/tags/ctf/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Cyber Apocalypse 2025 - 6x Web Challenges Writeup</title>
      <link>https://blog.s4yhii.com/posts/cyberapocalypse-ctf2025-web/</link>
      <pubDate>Tue, 25 Mar 2025 08:00:00 -0500</pubDate>
      <guid>https://blog.s4yhii.com/posts/cyberapocalypse-ctf2025-web/</guid>
      <description>&lt;p&gt;I participated as a member of team &lt;strong&gt;CibersecUNI&lt;/strong&gt;. This time i managed to solve all 6/6 challenges in the web category.&lt;/p&gt;
&lt;h1 id=&#34;whispers-of-the-moonbeam&#34;&gt;Whispers of the Moonbeam&lt;/h1&gt;
&lt;p&gt;Observando las funciones, nos dan una pista que se puede inyectar comandos con ;.&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;alt text&#34; loading=&#34;lazy&#34; src=&#34;https://raw.githubusercontent.com/s4yhii/s4yhii.github.io/master/assets/images/CA2025/image-1.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;Usando el comando gossip, puedo listar los archivos, se visualiza el archivo flag.txt, y con un simple ; puedo concatenar el comando cat para leer la flag.&lt;/p&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;gossip&lt;span class=&#34;p&#34;&gt;;&lt;/span&gt; cat flag.txt
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Obtenemos la flag. 🎉
HTB{Sh4d0w_3x3cut10n_1n_Th3_M00nb34m_T4v3rn_78cb9b70be3bf077e608865b967b5ab1}&lt;/p&gt;</description>
    </item>
    <item>
      <title>Cross Site Scripting (XSS)</title>
      <link>https://blog.s4yhii.com/posts/2022-05-10-cross-site-scripting-xss/</link>
      <pubDate>Wed, 18 May 2022 12:00:00 -0400</pubDate>
      <guid>https://blog.s4yhii.com/posts/2022-05-10-cross-site-scripting-xss/</guid>
      <description>&lt;p&gt;Cross-site scripting known as XSS is a web vulnerability in which malicious scripts are injected int benign and trusted websites. XSS occur when an attacker send malicious code in any user input fields in a browser to a different end-user.&lt;/p&gt;
&lt;h2 id=&#34;mechanisms&#34;&gt;Mechanisms&lt;/h2&gt;
&lt;p&gt;In an XSS attack the attacker inject script in HTML code so you&amp;rsquo;ll have to know javascript and HTML syntax, wbe uses scripts to control client-side application logic and make the website interactive, for example this script generates &lt;em&gt;Hello!&lt;/em&gt; pop-up on the web page:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Cyber Apocalypse 2023 2x Web Challenges Writeup</title>
      <link>https://blog.s4yhii.com/posts/2022-05-19-htb-cyber-apocalypse-ctf-web-writeups/</link>
      <pubDate>Wed, 18 May 2022 12:00:00 -0400</pubDate>
      <guid>https://blog.s4yhii.com/posts/2022-05-19-htb-cyber-apocalypse-ctf-web-writeups/</guid>
      <description>&lt;h1 id=&#34;kryptos-support&#34;&gt;Kryptos Support&lt;/h1&gt;
&lt;p&gt;Checking the web page of this challenge gives a form to send an issue and an admin will review that issue.
&lt;img loading=&#34;lazy&#34; src=&#34;https://raw.githubusercontent.com/s4yhii/s4yhii.github.io/master/assets/images/htb/ctf/ctf1.jpg&#34;&gt;&lt;/p&gt;
&lt;p&gt;So its interesting, maybe the admin will click in that issue and we can inject some kind of payload, like an stored xss, these approach is similar to the bankrobber box in htb.&lt;/p&gt;
&lt;p&gt;So we can craft the payload to steal the cookie of the admin or the user who will review out ticket.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
