Recap of Wizer’s 6-Hour Blitz CTF Event on May 5th
Earlier this month, we hosted our second 6-Hour Capture the Flag challenge! This event drew hundreds of developers and hackers from diverse backgrounds. Participants tackled a series of challenges by hacking short snippets of code by spotting vulnerabilities and exploiting them.
Congratulations to our CTF Challenge Winners!
1st - Jorian Woltjer, 6/6 challenges solved within 2 hours 21 minutes
2nd - Philippe Dourassov, 6/6 challenges solved within 2 hours 25 minutes
3rd - physuru, 6/6 challenges solved within 3 hours 57 minutes
Congratulations to our best writeups!
1st - Jorian Woltjer - view the writeup here
2nd - Stuart Larsen - view the writeup here
3rd - Hussein Misbah - view the writeup here
If you’re curious to give it a go, the challenge is open for practice. Join us for our next live event for the chance to win prizes!
What Each Wizer CTF Challenge Covered: A Snapshot
Login as an Admin
Most of you will probably find the issue quite quickly, yet exploiting it will take a couple of minutes. In this challenge, you’re required to bypass the current authentication and trick the app to log you in as an admin user.
First Solver: tarampampam
Augustus Gloop’s Secret
API Gateways are very common, especially when you have multiple sets of APIs which need to be routed between. Some gateways are also responsible for middleware functions. In this case, the API Gateway is responsible for the authentication part. Can you bypass the authentication and make a direct call to the internal API?
First Solver: Stuart Larsen
Hack the Menu
The developer of this code made a deliberate attempt to mitigate the vulnerability here and prevent XSS. Can you still find a bypass and trigger an XSS attack?
First Solver: Philippe Dourassov
Sensitive Flags
There’s many kinds of flags: Country flags, red flags, but also CTF flags. But in this challenge getting your hands on that CTF flag isn’t so easy. Can you bypass this complex authentication flow and steal the flag?
First Solver: Jorian Woltjer
Payloadception
What if I told you it was possible to have a single payload that contains a Local File Inclusion, a Server-Side Request Forgery vulnerability, a Command Injection, a Server-Side Template Injection, and a Cross-site Scripting?
First Solver: Philippe Dourassov
Sign Here!
Spotting the bug is easy, it’s an insecure direct object reference, but wait! Did you sign your request? No? Then you’re not allowed!
First Solver: Jorian Woltjer
This event showcased a captivating blend of individual talent, creativity, and problem-solving as participants competed to overcome the challenges. Congratulations to all the winners! We look forward to seeing you all again soon—stay tuned for our upcoming challenge announcement for Q3!
- OWASP 10 To Advanced Techniques
- Deep Dive Into 1 New Topic Monthly
- Fun CTF Challenges To Apply Learning