ctftime

My solutions for various CTF challenges

View on GitHub

JaWT Scratchpad

Web Exploitation - Points: 400

Check the admin scratchpad! https://2019shell1.picoctf.com/problem/12283/ or http://2019shell1.picoctf.com:12283

Login as arbitrary user and save the jwt token into a file. Crack the key with hashcat and the rockyou.txt wordlist.

$ hashcat -m 16500 token rockyou.txt

The secret is ilovepico, create a new token with user admin and the secret, e.g. here and update the cookie with the new token to get the flag.

flag: picoCTF{jawt_was_just_what_you_thought_9de8e25511a8841ab9ade0aa092be116}