Rows:
| CHALLENGE | AUTHORS | SOLVES (CURRENT) | SOLVE RATE (AT CONTEST TIME) |
|---|---|---|---|
WelcomeMisc | 1333 solves | - | |
AlpacaHack 2100Misc | 929 solves | - | |
a fact of CTFCrypto | 589 solves | - | |
Simple LoginWeb | 537 solves | Top 28% = 84/300 users | |
EmojifyWeb | 421 solves | - | |
394 solves | - | ||
359 solves | - | ||
echoPwn | 322 solves | Top 32% = 56/174 users | |
hit-and-missMisc | 273 solves | - | |
256 solves | Top 15% = 71/458 users | ||
Alpaca BankWeb | 249 solves | - | |
244 solves | - | ||
size limitCrypto | 244 solves | - | |
243 solves | - | ||
qrimeCrypto | 242 solves | Top 38% = 91/239 users | |
🐈Web | 237 solves | - | |
super-tomatoCrypto | 228 solves | - | |
Xmas LoginWeb | 222 solves | - | |
Safe PrimeCrypto | 215 solves | - | |
Country DBWeb | 213 solves | Top 33% = 246/729 teams |
Rows:
ある条件を満たすとフラグが得られるようです
import Fastify from "fastify";
import fastifyCookie from "@fastify/cookie";
const fastify = Fastify();
fastify.register(fastifyCookie);
fastify.get("/", async (req, reply) => {
reply.setCookie('admin', 'false', { path: '/', httpOnly: true });
if (req.cookies.admin === "true")
reply.header("X-Flag", process.env.FLAG);
return "can you get the flag?";
});
fastify.listen({ port: process.env.PORT, host: "0.0.0.0" });
*完全なソースコードは以下からダウンロード可能です。