Web Exploitation - 300 points
We found a hidden flag server hiding behind a proxy, but the proxy has some... interesting ideas of what qualifies someone to make HTTP requests. Looks like you'll have to do this one by hand. Try connecting via nc 2018shell2.picoctf.com 2651, and use the proxy to send HTTP requests to
flag.local
. We've also recovered a username and a password for you to use on the login page:realbusinessuser
/potoooooooo
.
Be the browser. When you navigate to a page, how does your browser send HTTP requests? How does this change when you submit a form?
We basically need to manually create HTTP GET and POST requests.
See log.txt
picoCTF{0nLY_Us3_n0N_GmO_xF3r_pR0tOcol5_5f5f}