HackTheWeb Happy Holidays! ๐
Wait, you forgot to give me the Advent calendar!?!?! And what is that supposed to mean, I should have opened the doors up until today?? Ugh, okay, then Iโll start: Door 1
Investigation
The hint suggests that we need to visit the โdoorsโ of the Advent calendar. The URL structure was identified as:
1 | GET https://hack.arrrg.de/adventskalender/$$ |
Where $$ represents the door number. To find the flag,
we need to check all possible doors (1 to 30).
Solution
Using Zaproxy (OWASP ZAP) or a similar fuzzer, we can automate the process:
- Intercept/Send Request: Create a base request to
https://hack.arrrg.de/adventskalender/1. - Set Payload: In Zaproxyโs fuzzer, set the payload for the door number position.
- Configure Generator: Use a
Numberzz generator:
- From: 1
- To: 30
- Step: 1
- Execute Fuzz: Start the fuzzer and monitor the responses.
- Analyze Results: Look for a response that differs in content.
After fuzzing, collecting the responses and looking for a secret message was revealed the hidden message.
THE ANSWER: FELIZNAVIDAD