picoctf introtoburp challange

picoCTF IntroToBurp: Web Exploitation

I recently tackled the PicoCTF IntroToBurp challenge using Burp Suite, and it was an enjoyable learning experience! This beginner-friendly challenge helped me dive into the world of web security and request manipulation. Let’s break down how I approached the challenge step-by-step.

Welcome to My PicoCTF Journey

I recently tackled the PicoCTF IntroToBurp challenge using Burp Suite. This beginner-friendly task was a fun learning experience!

picoCTF IntroToBurp: Web Exploitation

Overview of PicoCTF IntroToBurp

Challenge: IntroToBurpDescription: Details unlock after launching the instance.Hints:

  • Use Burp Suite to intercept requests and grab the flag.
  • Mangle requests; the server might mishandle malformed inputs.

Diving into the Challenge

I started by accessing the challenge page, greeted by a registration form. After filling it out, I clicked “Register.

picoCTF IntroToBurp: Web Exploitation

The next page prompted me for an OTP.

introtoburp otp page

Entering a random one and submitting returned “Invalid OTP.

Analyzing with Burp Suite

I intercepted the request using Burp Suite and sent it to Repeater for analysis.

Analyzing with Burp Suite

This sparked three ideas:

  • Test a random OTP.
  • Use Burp Intruder to brute-force the OTP.
  • Remove the OTP from the header entirely.

Finding the Solution

Finding the Solution

I opted for the quickest test first—removing the OTP from the header. Sent the request, and boom, the flag appeared!

picoCTF IntroToBurp: Web Exploitation

Conclusion

This simple challenge taught me Burp Suite basics. Thanks for reading my blog—stay tuned for more hacking adventures!


thank you for reading my blog

Leave a Comment

Your email address will not be published. Required fields are marked *