247CTF solution: Secured session

In this challenge, we have code in python. As we read the file, we can see that before the web compare the parameter secret_key with os.urandom(24), the session is already set equal to the flag.

So, we only need to get the session of the page: https://d2a55b8b83bf981a.247ctf.com/flag

eyJmbGFnIjp7IiBiIjoiTWpRM1ExUkdlMlJoT0RBM09UVm1PR0UxWTJGaU1tVXdNemRrTnpNNE5UZ3dOMkk1WVRreGZRPT0ifX0.YEDySg.JxL0wjTpynKN91NMg4u75rjIX_Y

Decode this base64 string twice and we can get the flag.

Leave a comment

Design a site like this with WordPress.com
Get started