PicoCTF 2023: FINDME
- Steve Kinyanjui
- May 23, 2024
- 1 min read
The Page Redirections challenge involved navigating a web application's login page and leveraging URL manipulations and Base64 decoding to uncover the hidden flag.
Step-by-Step Walkthrough
1. Logging In
The first step was to log in to the website using the provided credentials:
Username: test
Password: test!
Upon successful login, the URL changed, indicating a page redirection.
2. Analyzing the URL
After logging in, the URL changed to:

The presence of (== )at the end of the parameter value suggested that it was Base64 encoded. To investigate further, I hit the back button in the browser and found another URL:

3. Combining the Encoded Strings
The two discovered URLs provided partial Base64 encoded strings:
First part: cGljb0NURntwcm94aWVzX2Fs
Second part: bF90aGVfd2F5XzNkOWUzNjk3fQ==
Combining these parts yielded the full Base64 encoded string:
cGljb0NURntwcm94aWVzX2FsbF90aGVfd2F5XzNkOWUzNjk3fQ==
4. Decoding the Base64 String
Using CyberChef, I combined and decoded the Base64 string to get the flag:
picoCTF{proxies_all_the_way_3d9e3697}

Comments