Rows:
CHALLENGE | AUTHORS | SOLVES (CURRENT) | SOLVE RATE (AT CONTEST TIME) |
---|---|---|---|
WelcomeMisc | 1001solves | - | |
Simple LoginWeb | 437solves | Top 28%= 84/300 users | |
echoPwn | 277solves | Top 32%= 56/174 users | |
215solves | Top 15%= 71/458 users | ||
qrimeCrypto | 196solves | Top 38%= 91/239 users | |
Country DBWeb | 179solves | Top 33%= 246/729 teams | |
inboundPwn | 166solves | Top 28%= 57/197 users | |
masking tapeRev | 134solves | Top 19%= 61/316 users | |
before-writePwn | 125solves | - | |
catcpyPwn | 116solves | Top 20%= 41/197 users | |
Alpaca PollWeb | 102solves | Top 9%= 42/458 users | |
101solves | Top 15%= 42/279 users | ||
JackpotWeb | 101solves | Top 29%= 63/213 users | |
hexechoPwn | 96solves | Top 15%= 27/174 users | |
Rainbow Sweet AlchemistCrypto | 95solves | Top 17%= 42/239 users | |
OysterPwn | 84solves | Top 42%= 40/95 users | |
CaaSWeb | 74solves | Top 4%= 13/300 users | |
writePwn | 67solves | - | |
Pico Note 1Web | 64solves | Top 3%= 10/300 users | |
CakeGEARWeb | 62solves | Top 14%= 104/713 teams |
Rows:
ある条件を満たすとフラグが得られるようです
import Fastify from "fastify";
import fastifyCookie from "@fastify/cookie";
const fastify = Fastify();
fastify.register(fastifyCookie);
fastify.get("/", async (req, reply) => {
reply.setCookie('admin', 'false', { path: '/', httpOnly: true });
if (req.cookies.admin === "true")
reply.header("X-Flag", process.env.FLAG);
return "can you get the flag?";
});
fastify.listen({ port: process.env.PORT, host: "0.0.0.0" });
*完全なソースコードは以下からダウンロード可能です。