Rows:
| CHALLENGE | AUTHORS | SOLVES (CURRENT) | SOLVE RATE (AT CONTEST TIME) |
|---|---|---|---|
WelcomeMisc | 1244 solves | - | |
AlpacaHack 2100Misc | 669 solves | - | |
Simple LoginWeb | 510 solves | Top 28% = 84/300 users | |
a fact of CTFCrypto | 465 solves | - | |
EmojifyWeb | 323 solves | - | |
echoPwn | 311 solves | Top 32% = 56/174 users | |
299 solves | - | ||
269 solves | - | ||
246 solves | Top 15% = 71/458 users | ||
qrimeCrypto | 229 solves | Top 38% = 91/239 users | |
hit-and-missMisc | 213 solves | - | |
Country DBWeb | 205 solves | Top 33% = 246/729 teams | |
size limitCrypto | 192 solves | - | |
191 solves | - | ||
191 solves | - | ||
Alpaca BankWeb | 188 solves | - | |
inboundPwn | 187 solves | Top 28% = 57/197 users | |
Safe PrimeCrypto | 164 solves | - | |
Fully Padded RSACrypto | 161 solves | - | |
masking tapeRev | 160 solves | Top 19% = 61/316 users |
Rows:
ある条件を満たすとフラグが得られるようです
import Fastify from "fastify";
import fastifyCookie from "@fastify/cookie";
const fastify = Fastify();
fastify.register(fastifyCookie);
fastify.get("/", async (req, reply) => {
reply.setCookie('admin', 'false', { path: '/', httpOnly: true });
if (req.cookies.admin === "true")
reply.header("X-Flag", process.env.FLAG);
return "can you get the flag?";
});
fastify.listen({ port: process.env.PORT, host: "0.0.0.0" });
*完全なソースコードは以下からダウンロード可能です。