Pico CTF- Web exploitation walkthrough (1–5)
Harshleen chawla
Masters in Cybersecurity | Security Tester | Exploring Blockchain & Web3 | Technical Content Writer | Content Creator
In Burp Suite:
2. CTF-Cookies
In your web browser
3. CTF Insp3ct0r
Combine information from files and the edited cookie to get the flag.
4. CTF- Scavenger Hunt
Result: You’ll obtain the third flag by making this modification in the URL.
5. CTF- Some Assembly Required 1
Result: A new tab will open, revealing another vulnerability code. This tab will also display the flag.