# Speedrun 4

Web  

### Description  
[https://udctf-fb.firebaseapp.com/](https://udctf-fb.firebaseapp.com/)

  
  
  

### Solution

#### Discovery  
We used BurpSuite  
  
At first, we disable intercept  
  
Under Proxy -> WebSockets history, we filtered such that we only saw outgoing
messages  
  
We see that it always sends 4 times  
  
The content are as follows:  
  
1. `{"t":"d","d":{"r":1,"a":"s","b":{"c":{"sdk.js.8-3-1":1}}}}`  
2. `{"t":"d","d":{"r":2,"a":"q","b":{"p":"/books","h":""}}}`  
3. `{"t":"d","d":{"r":3,"a":"n","b":{"p":"/books"}}}`  
4. `{"t":"d","d":{"r":4,"a":"q","b":{"p":"/books","h":""}}}`

We realise that they access directories  

#### Getting the flag  
We enable intercept to see the incoming messages  
  
We edit the 2nd and 3rd messages  
  
2nd message became `{"t":"d","d":{"r":1,"a":"q","b":{"p":"/flag","h":""}}}`  
  
3rd message became `{"t":"c","d":{"t":"p","d":{flag}}}`  
  
Then, it returned a message with the flag
`{"t":"d","d":{"b":{"p":"flag","d":"UDCTF{l34rn_d4t4b4s3_rul3s}"},"a":"d"}}`  
  
  
![](./Assets/sr4.PNG)  

  
  
> UDCTF{l34rn_d4t4b4s3_rul3s}

  
  
  

#### Obligatory bragging rights  
My second ever first-blood on the same ctf LOL  
  
![](./Assets/nice.PNG)  
  
  
![](./Assets/morelolzzz.PNG)  

Original writeup (https://github.com/StrixGoldhorn/CTF-
Writeups/blob/main/BlueHens%202021/Web%20Speedruns/Speedrun%204.md).# Speedrun 4

Web  

### Description  
[https://udctf-fb.firebaseapp.com/](https://udctf-fb.firebaseapp.com/)

  
  
  

### Solution

#### Discovery  
We used BurpSuite  
  
At first, we disable intercept  
  
Under Proxy -> WebSockets history, we filtered such that we only saw outgoing
messages  
  
We see that it always sends 4 times  
  
The content are as follows:  
  
1\. `{"t":"d","d":{"r":1,"a":"s","b":{"c":{"sdk.js.8-3-1":1}}}}`  
2\. `{"t":"d","d":{"r":2,"a":"q","b":{"p":"/books","h":""}}}`  
3\. `{"t":"d","d":{"r":3,"a":"n","b":{"p":"/books"}}}`  
4\. `{"t":"d","d":{"r":4,"a":"q","b":{"p":"/books","h":""}}}`

We realise that they access directories  

#### Getting the flag  
We enable intercept to see the incoming messages  
  
We edit the 2nd and 3rd messages  
  
2nd message became `{"t":"d","d":{"r":1,"a":"q","b":{"p":"/flag","h":""}}}`  
  
3rd message became `{"t":"c","d":{"t":"p","d":{flag}}}`  
  
Then, it returned a message with the flag
`{"t":"d","d":{"b":{"p":"flag","d":"UDCTF{l34rn_d4t4b4s3_rul3s}"},"a":"d"}}`  
  
  
![](./Assets/sr4.PNG)  

  
  
> UDCTF{l34rn_d4t4b4s3_rul3s}

  
  
  

#### Obligatory bragging rights  
My second ever first-blood on the same ctf LOL  
  
![](./Assets/nice.PNG)  
  
  
![](./Assets/morelolzzz.PNG)  

Original writeup (https://github.com/StrixGoldhorn/CTF-
Writeups/blob/main/BlueHens%202021/Web%20Speedruns/Speedrun%204.md).