<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:media="http://search.yahoo.com/mrss/"><channel><title>housecat-rtcp-ctf on GhostPosts™</title><link>https://blog.sohamsen.me/en/tags/housecat-rtcp-ctf/</link><description>Recent content in housecat-rtcp-ctf on GhostPosts™</description><generator>Hugo -- gohugo.io</generator><language>en</language><managingEditor>hi@sohamsen.me (Soham Sen)</managingEditor><webMaster>hi@sohamsen.me (Soham Sen)</webMaster><copyright>© 2020, All Rights Reserved</copyright><lastBuildDate>Sun, 26 Apr 2020 19:59:05 +0530</lastBuildDate><atom:link href="https://blog.sohamsen.me/en/tags/housecat-rtcp-ctf/index.xml" rel="self" type="application/rss+xml"/><item><title>Overriding JS to Perform SQL Injection (Housecat RTCP CTF Writeup: Blog from the future)</title><link>https://blog.sohamsen.me/en/posts/overriding-js-sql-injection/</link><pubDate>Sun, 26 Apr 2020 19:59:05 +0530</pubDate><author>hi@sohamsen.me (Soham Sen)</author><atom:modified>Mon, 11 Mar 2024 19:08:00 +0530</atom:modified><guid>https://blog.sohamsen.me/en/posts/overriding-js-sql-injection/</guid><description>The TL;DR of this challenge was SQL injection and overriding javascript (to skip the encrypt/decrypt functions).
Challenge Challenge Name: Blog from the future
Challenge Description:
My friend Bob likes sockets so much, he made his own blog to talk about them. Can you check it out and make sure that it&amp;rsquo;s secure like he assured me it is?
Link
Solution JS Overriding Rule #1 of web CTFs: ALWAYS check robots.txt first! This time I found:
User-Agent: * Disallow: /admin And in /admin there is a comment saying you need to use TOTP (Time Based OTP. Who does not use a TOTP for 2-factor authentication in 2020?</description><dc:creator>Soham Sen</dc:creator><category>web-ctf</category><category>housecat-rtcp-ctf</category><category>CTF Writeups</category></item><item><title>Breaking Math.random() and Predicting Random Numbers (Housecat RTCP CTF Writeup: JS Lotto)</title><link>https://blog.sohamsen.me/en/posts/breaking-math-random/</link><pubDate>Sun, 26 Apr 2020 19:07:36 +0530</pubDate><author>hi@sohamsen.me (Soham Sen)</author><atom:modified>Mon, 11 Mar 2024 19:08:00 +0530</atom:modified><guid>https://blog.sohamsen.me/en/posts/breaking-math-random/</guid><description>TL;DR? Here.
PS: You need to do pip install z3-solver requests for this to work.
Okay so a little confession: Before the CTF challenge, I didn&amp;rsquo;t think much of Cryptographically Secure Pseudo Random Generators (CSPRNGS), and thought they were just for very high security purposes, like defence against a state level hacking agency. I thought normal PRNGs were enough for day-to-day purposes and no one could realistically break it.
After this CTF&amp;hellip;oh boy, it takes 30 mins to break PRNGs (the one used by Javascript in Chrome/Firefox) and I&amp;rsquo;m never going to use those for security again. I should&amp;rsquo;ve never&amp;hellip;</description><dc:creator>Soham Sen</dc:creator><category>miscellaneous-ctf</category><category>housecat-rtcp-ctf</category><category>CTF Writeups</category></item></channel></rss>