CTF Challenge Guide
Complete walkthrough of all vulnerability challenges
Challenge Overview
How to Play
- Explore the application and identify security vulnerabilities
- Exploit the vulnerabilities to discover hidden flags
- Submit flags on the Flag Submission page for points
- Use hint mode for guided learning (reduces points by 50%)
- Learn about prevention techniques and security best practices
Cross-Site Scripting (XSS)
MediumDescription
JavaScript injection vulnerability that allows execution of malicious scripts in the browser context.
Target Location
Search functionality
Flag Format
FL4G{X55_F0UND}
💡 Hints
- •Look for input fields that display user content
- •Try injecting HTML tags and JavaScript code
- •Test both stored and reflected XSS vectors
- •Example payload: <script>alert('XSS')</script>
🛡️ Prevention Techniques
- ✓Sanitize and validate all user inputs
- ✓Use Content Security Policy (CSP)
- ✓Encode output data before rendering
- ✓Use secure templating engines
SQL Injection
HighDescription
Database query manipulation that can lead to unauthorized data access, modification, or deletion.
Target Location
Login form
Flag Format
FL4G{5QL_1NJ3CT10N_5UCC355}
💡 Hints
- •Examine forms that interact with databases
- •Try SQL metacharacters in input fields
- •Test authentication bypass techniques
- •Example payload: admin' OR '1'='1' --
🛡️ Prevention Techniques
- ✓Use parameterized queries/prepared statements
- ✓Apply input validation and sanitization
- ✓Implement least privilege database access
- ✓Use stored procedures with proper validation
Insecure Direct Object Reference (IDOR)
MediumDescription
Access control vulnerability allowing unauthorized access to objects by manipulating reference values.
Target Location
Product pages
Flag Format
FL4G{1D0R_4DM1N_4CC355}
💡 Hints
- •Look for numeric IDs in URLs
- •Try accessing different object identifiers
- •Test sequential ID enumeration
- •Check for admin or hidden resources
🛡️ Prevention Techniques
- ✓Implement proper access controls
- ✓Use indirect object references (UUIDs)
- ✓Validate user authorization for each request
- ✓Apply role-based access control
Local File Inclusion (LFI)
HighDescription
File system access vulnerability that allows reading of local server files through path manipulation.
Target Location
Product file viewer
Flag Format
FL4G{LF1_*}
💡 Hints
- •Look for file parameter inputs
- •Try directory traversal sequences
- •Test relative and absolute paths
- •Example payload: ../../../etc/passwd
🛡️ Prevention Techniques
- ✓Validate and sanitize file paths
- ✓Use whitelists for allowed files
- ✓Implement proper access controls
- ✓Avoid user input in file operations
File Upload Vulnerabilities
HighDescription
Insecure file upload that can lead to remote code execution or system compromise.
Target Location
Profile page
Flag Format
FL4G{*UPL04D*}
💡 Hints
- •Look for file upload functionality
- •Try uploading different file types
- •Test executable file extensions
- •Examine file validation mechanisms
🛡️ Prevention Techniques
- ✓Validate file types and extensions
- ✓Scan uploaded files for malware
- ✓Store uploads outside web root
- ✓Implement file size restrictions
⚠️ Ethical Guidelines
• Only test on systems you own or have explicit permission to test
• Never use these techniques on unauthorized systems
• Respect responsible disclosure practices
• Use knowledge for defensive purposes