Writeups
/Home/Ctfs/Pingctf2022/ping app/
Author: argot
Pub: 2022-12-18
140 words

Challenge

Look what I’ve learnt! I have even obfuscated it! You can’t possibly find my flag there. No easy points here ;)

https://ping_app.knping.pl/

Overview

Looks like there’s a Flutter app running at the host. We look through the dart.js and see some interesting endpoints.

Endpoint

When visiting the uuid endpoint, it looks like we are on the right track:

Crumbs

Debugging

After digging through some of the JavaScript, a stop is set on a function that is hit when access the uuid endpoint.

Debug1

Stepping into the function, we see some obvious data in an array for probable obfuscation.

Debug2

Chasing that data throughout the code, we continue to step through the process and note the array is concatenated:

String1

Eventually, the function populates another array with obvious ASCII characters.

Array1

Flag

The suspicious array is copied and the flag is obtained once converted into characters.

Flag