Post

Global Cyber Skills Benchmark CTF 2025: Operation Blackout

Global Cyber Skills Benchmark CTF 2025: Operation Blackout

Secure Coding

Phoenix Sentinel

Phoenix Sentinel Initial View

This challenge is about a web application that is vulnerable to SSRF but it’s protected by ssrf-req-filter.

SSRF Protection Details SSRF Vulnerability Analysis

Flag in /incident-reports endpoint but it’s just can be accessed via localhost and we need to access it via SSRF. But how to bypass ssrf-req-filter? Here is my exploitation:

  1. We need a URL that is not blocked by ssrf-req-filter and it will redirect to http://localhost:8080/challenge/incident-reports endpoint. I use httpbin.org to do this.

Redirect Setup

  1. Submit the URL to the application and trigger the SSRF.

SSRF Exploitation

Okay, and this is a secure coding challenge and we need to patch the SSRF vulnerability. We can patch it by adding /incident-reports to the blacklist.

SSRF Patch Implementation

Darkwire

Darkwire Initial View

This challenge is about a Java web application that is vulnerable to Zip Slip.

Zip Slip Vulnerability Details

In this challenge, I don’t exploit it and I just patch the vulnerability.

Zip Slip Patch Implementation

Web

Blackout Ops

Blackout Ops Initial View

This challenge is about a web application that is vulnerable to XSS and GraphQL vulnerability.

First, I found an XSS vulnerability in /admin endpoint and cookie that used as a session cookie is set to HttpOnly flag. Flag is in /admin endpoint.

XSS Vulnerability Details Session Cookie Analysis

To exploit the XSS vulnerability, I need to report an incident. But to report an incident, I need to verify my account. And I verify my account by using GraphQL vulnerability.

Account Verification Process GraphQL Vulnerability Exploitation

Okay, admin bot will go to evidence_url automatically. The idea is to post a malicious payload to the title or details incident and http://localhost:1337/admin in evidence_url. Bot will auto go to this endpoint and trigger the XSS payload in this page.

XSS Payload Implementation XSS Exploitation Result

This post is licensed under CC BY 4.0 by the author.