Huntress CTF: Week 2 - WarmUps
Chicken Wings
Opening the file with a text editor yields… (if you’re old like me you may recognize it)
Wingdings! Head over to dcode.fr and translate it.
F12
Hit the Start button and we’re provided with a URL and port.
Open the site in a browser and enable source debugging, usually “F12” as the challenge suggests.
If you click on the blue Capture The Flag button, you may observe a VERY quick pop-up.
If we scroll to the bottom of the source code, (in CTF’s and Malware I always tend to hunt bottom up first), we see that the pop-up being invoked is at ./capture_the_flag.htm/. If we append that to our current URL…
We get to our flag page. Here I right clicked on the “Your flag is:” to select View Page Source.
Magic Cookies
As with previous interactive challenges, we’ll start with the obvious “Start”
We have a URL and port. Let’s open this in Chrome.
Pressing cook next to one of the recipes starts a countdown timer.
F12 in Chrome will toggle the Developer options.
Navigating to Application > Storage reveals the cookies. We have a cookie for in_oven with a Base64 value.
This gets decoded as {“recipe”: “Magic Cookies”, “time”: “10/11/2023, 15:50:04”}
Having also reviewed the source code it looks like this value that’s representing the start of the ‘baking.’ Either we can wait around for 120 hours to see what happens next, or we can travel through time. Sort of.
So we know the formula for the cookie values. We can use that to generate our own cookie. Using the same text, only changing the date to 10/06/2023, we’ll encode that string in Base64.
There’s a plugin for Chrome called “🍪 EditThisCookie “.
Substitute the Base64 we generated and apply the cookie.
Refresh the window and the flag should appear.
Use the tag #HuntressCTF on BakerStreetForensics.com to see all related posts and solutions for the 2023 Huntress CTF.