Web - Client

Friday 22 October 2021, 22:09  #1
Web Socket - 0 protection
Spokloo
  • 3 posts

Bonjour, je suis complètement bloqué pour ce challenge. J’ai trouvé le code du websocket etc et je pense qu’il faut faire un truc avec le cookie mais j’ai aucune idée de comment faire. Pourrais-t-on m’aiguiller ? Merci

Monday 25 October 2021, 22:05  #2
Web Socket - 0 protection
johngreen
  • 5 posts

Hello,
Pareil pour moi.
J’ai cherché un lien caché pour se logguer en tant qu’admin ou un message à envoyer au bot pour qu’il réponde une série d’autres instructions... en vain pour le moment.

Saturday 20 November 2021, 23:04  #3
Web Socket - 0 protection
Slack
  • 2 posts

Bonsoir,

WEBSOCKET et un gros indice sous le titre du challenge, faut creuser avec ça

Sunday 23 January 2022, 16:09  #4
Web Socket - 0 protection
huysuper
  • 1 posts

I don’t know how to find the secret code :(

Wednesday 9 March 2022, 15:49  #5
Web Socket - 0 protection
terminhackor
  • 1 posts

Bonjour,

Perdu également avec les WebSocket, je ne sais pas trop où envoyer des requêtes, j’ai vu le format ws://.... j’ai essayé dans la barre url, mais cela ne fonctionne pas. J’ai aussi essayé dans la console, et via le terminal, telnet etc ...
Pas moyen, ...

Un petit indice svp ?

Merci par avance.

Monday 4 April 2022, 02:39  #6
Web Socket - 0 protection
Post Capone
  • 1 posts

Checking out the Web Socket 0 Protection challenge: From Burp Repeater, the origin is configurable from "http://ctf04.root-me.org" however I’ve tried a few different things, and I don’t seem to have any luck tricking the bot to correctly answer "What is the Flag?"

I’ve done some research into manipulating the cookie and sec-websocket-key, but have not found anything that lead me down a better path yet.

Any additional hints would be appreciated :)

Monday 30 May 2022, 21:37  #7
Web Socket - 0 protection
SamXML
  • 1 posts

I finally solved this. In case it is helpful to others, I’ll pass along that it worked for me in "Room 30". The exact same exploit did NOT work in "Room 02" or "Room 04". I have no explanation as to why.

In those rooms where my exploit did not work, I WAS able to connect to "ws://localhost/ws" successfully but NOT to "ws://ctf02.root-me/ws". Of course, the admin’s cookie is tied to the actual domain name and so connecting to localhost did NOT treat me as the admin.

In case anyone has ideas why some rooms work ok and others do not, please share you thoughts since I am very curious about this.

 Sam

Thursday 2 June 2022, 16:31  #8
Web Socket - 0 protection
Arcghar
  • 3 posts

Thanks Sam. I had exactly the same problem and I don’t think finding the right room should be part of the challenge. Can an admin look at this ?

Wednesday 8 June 2022, 22:07  #9
Web Socket - 0 protection
client9784
  • 1 posts

Thank you sam! You saved the day :)

Thursday 19 October 2023, 16:46  #10
Web Socket - 0 protection
Malbenk
  • 1 posts

I can’t solve this in any way. I have a suspicion that I need to exploit the report page, but I have spent way too much time in this. Please provide any hint

Friday 20 October 2023, 07:39  #11
Web Socket - 0 protection
euclyde
  • 1 posts

The admin will go to the URL that you have reported in the form.

Friday 27 October 2023, 21:31  #12
Web Socket - 0 protection
lomdes
  • 5 posts

I received the flag for the challenge and the box.
I entered the one for the box, it said I compromised the env and it is shutting down.
Then I go to the challenge page and enter the flag for validation but it is not accepted.
Did I do something wrong?

Friday 27 October 2023, 21:41  #13
Web Socket - 0 protection
lomdes
  • 5 posts

Nevermind, I received the flag in a weird format and did not copy it correctly.

Saturday 21 December 2024, 07:32  #14
Web Socket - 0 protection
johnwick
  • 3 posts

i am struck i need some hint