AlpacaHack Logo

Challenges

Sign InSign Up

Rows:

CHALLENGEAUTHORS

SOLVES

(CURRENT)

SOLVE RATE

(AT CONTEST TIME)

Welcome
Misc

admin

1077

solves

-

AlpacaHack Round 2 (Web)

469

solves

Top 28%

= 84/300 users

echo
Pwn

AlpacaHack Round 1 (Pwn)

297

solves

Top 32%

= 56/174 users

AlpacaHack Round 7 (Web)

235

solves

Top 15%

= 71/458 users

qrime
Crypto

AlpacaHack Round 3 (Crypto)

211

solves

Top 38%

= 91/239 users

CakeCTF 2023

196

solves

Top 33%

= 246/729 teams

AlpacaHack Round 6 (Pwn)

182

solves

Top 28%

= 57/197 users

AlpacaHack Round 8 (Rev)

148

solves

Top 19%

= 61/316 users

RTACTF 2023 Spring

141

solves

-

AlpacaHack Round 6 (Pwn)

128

solves

Top 20%

= 41/197 users

AlpacaHack Round 11 (Web)

120

solves

Top 29%

= 63/213 users

AlpacaHack Round 7 (Web)

110

solves

Top 9%

= 42/458 users

AlpacaHack Round 4 (Rev)

109

solves

Top 15%

= 42/279 users

AlpacaHack Round 3 (Crypto)

103

solves

Top 17%

= 42/239 users

AlpacaHack Round 1 (Pwn)

103

solves

Top 15%

= 27/174 users

AlpacaHack Round 10 (Pwn)

97

solves

Top 42%

= 40/95 users

CaaS
Web

AlpacaHack Round 2 (Web)

81

solves

Top 4%

= 13/300 users

RTACTF 2023 Spring

74

solves

-

CakeCTF 2022

68

solves

Top 14%

= 104/713 teams

AlpacaHack Round 2 (Web)

67

solves

Top 3%

= 10/300 users

Rows:

🍪

SECCON CTF 13 決勝観戦CTF
172 solves
BeginnerWeb

Author:

ある条件を満たすとフラグが得られるようです

import Fastify from "fastify";
import fastifyCookie from "@fastify/cookie";

const fastify = Fastify();
fastify.register(fastifyCookie);

fastify.get("/", async (req, reply) => {
  reply.setCookie('admin', 'false', { path: '/', httpOnly: true });
  if (req.cookies.admin === "true")
    reply.header("X-Flag", process.env.FLAG);
  return "can you get the flag?";
});

fastify.listen({ port: process.env.PORT, host: "0.0.0.0" });

*完全なソースコードは以下からダウンロード可能です。

cookie.tar.gz
descriptionsolveswriteups