<?xml version="1.0" encoding="utf-8"?>
<!-- generator="FeedCreator 1.7.2-ppt DokuWiki" -->
<?xml-stylesheet href="http://wiki.zenk-security.com/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="http://wiki.zenk-security.com/feed.php">
        <title>Zenk - Security hackingweek_2014:web</title>
        <description></description>
        <link>http://wiki.zenk-security.com/</link>
        <image rdf:resource="http://wiki.zenk-security.com/lib/tpl/dokuwiki/images/favicon.ico" />
       <dc:date>2026-04-24T02:09:18+02:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:web:web1&amp;rev=1394114593&amp;do=diff"/>
                <rdf:li rdf:resource="http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:web:web2&amp;rev=1394123866&amp;do=diff"/>
                <rdf:li rdf:resource="http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:web:web3&amp;rev=1394114623&amp;do=diff"/>
                <rdf:li rdf:resource="http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:web:web4&amp;rev=1394114655&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="http://wiki.zenk-security.com/lib/tpl/dokuwiki/images/favicon.ico">
        <title>Zenk - Security</title>
        <link>http://wiki.zenk-security.com/</link>
        <url>http://wiki.zenk-security.com/lib/tpl/dokuwiki/images/favicon.ico</url>
    </image>
    <item rdf:about="http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:web:web1&amp;rev=1394114593&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2014-03-06T15:03:13+02:00</dc:date>
        <title>hackingweek_2014:web:web1</title>
        <link>http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:web:web1&amp;rev=1394114593&amp;do=diff</link>
        <description>Page d'authentification avec vérification du couple login/pass en javascript :


function validate() {
	var username = document.getElementById(&quot;username&quot;).value;
	var password = document.getElementById(&quot;password&quot;).value;
	password = md5(password);
	if ((username != &quot;neo&quot;) || (password != &quot;92920e406dd7a1e5eb7e614f4f95554b&quot;)) {
		alert(&quot;Try again!&quot;);
		return false;
	} else {
		return true;
	}
}</description>
    </item>
    <item rdf:about="http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:web:web2&amp;rev=1394123866&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2014-03-06T17:37:46+02:00</dc:date>
        <title>hackingweek_2014:web:web2</title>
        <link>http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:web:web2&amp;rev=1394123866&amp;do=diff</link>
        <description>Moteur de recherche Taagle

Code source disponible pour cette épreuve : &lt;https://repo.zenk-security.com/hackingweek2014_ctf/web2.zip&gt;

code index.php


&lt;?php session_start(); ?&gt;
&lt;!DOCTYPE html&gt;
&lt;html&gt;
  &lt;head&gt;
    &lt;meta charset=&quot;utf-8&quot; /&gt;
    &lt;link rel=&quot;stylesheet&quot; href=&quot;../style.css&quot; /&gt;
    &lt;title&gt;Web 2&lt;/title&gt;
  &lt;/head&gt;

  &lt;body&gt;
	&lt;div id=&quot;background&quot;&gt;
		&lt;h1&gt;Web 2&lt;/h1&gt;
		
		&lt;form method=&quot;get&quot; action=&quot;search.php&quot;&gt;
			&lt;img src=&quot;../pictures/taagle.png&quot; alt=&quot;Taagle&quot; id=&quot;taagle&quot;/&gt;&lt;br /&gt;
			&lt;span id…</description>
    </item>
    <item rdf:about="http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:web:web3&amp;rev=1394114623&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2014-03-06T15:03:43+02:00</dc:date>
        <title>hackingweek_2014:web:web3</title>
        <link>http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:web:web3&amp;rev=1394114623&amp;do=diff</link>
        <description>Code source disponible pour cette épreuve : &lt;https://repo.zenk-security.com/hackingweek2014_ctf/web3.zip&gt;

En analysant les sources on remarque la présence d'un fichier success.php


&lt;?php

require_once &quot;../secret.php&quot;;
session_start();

(isset($_SESSION['web3'])) or die(&quot;Oops! This page appears broken - Access error.&quot;);
echo &quot;Success! The password is \&quot;&quot; . $secretpassword3 . &quot;\&quot;&quot;;

?&gt;</description>
    </item>
    <item rdf:about="http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:web:web4&amp;rev=1394114655&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2014-03-06T15:04:15+02:00</dc:date>
        <title>hackingweek_2014:web:web4</title>
        <link>http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:web:web4&amp;rev=1394114655&amp;do=diff</link>
        <description>Code source disponible pour cette épreuve : &lt;https://repo.zenk-security.com/hackingweek2014_ctf/web4.zip&gt;

Le but de cette épreuve est de se retrouver authentifier sur la page auth.php, pour cela, il faut avoir un cookie valide, mais c'est quoi un cookie valide ?</description>
    </item>
</rdf:RDF>
