Post

srdnlenCTF web/Ben 10

My solution for srdnlenCTF web/Ben 10 challenge

Challenge overview

Ben 10

The “Ben 10” challenge presents a web application themed around Ben Tennyson’s Omnitrix, featuring hidden credentials and an access control vulnerability. The objective is to exploit these weaknesses to retrieve a flag.

Analysis

The challenge provides:

  • a web application at http://ben10.challs.srdnlen.it:8080
  • a hint about a mysterious “Materia Grigia” form hidden in the system

During account creation, the application contains a hidden HTML element with admin credentials:

1
2
<!-- secret admin username -->
<div style="display:none;" id="admin_data">admin^victim99^a6b0fc68a1</div>

This reveals:

  • username format: admin^USERNAME^a6b0fc68a1
  • account identifier pattern using ^ as a delimeter

Exploitation

  1. Account creation
    • create a regular user account
    • note the default password pattern using something like victim:victim
  2. Password reset exploitation
    • initiate password reset for your regular account
    • capture the reset token
    • use the same token with the hidden admin username admin^victim99^a6b0fc68a1
    • submit to /forgot_password endpoint
  3. Admin access
    • login with the admin credentials
    • navigate to view ben10.webp
    • retrieve flag

Flag

Flag:
srdnlen{b3n_l0v3s_br0k3n_4cc355_c0ntr0l_vulns}

Key takeaways

  1. IDOR - application allows password reset tokens to be reused across accounts and no proper validation of token ownership.
  2. Information Disclosure - Hidden HTML elements expose sensitive admin credentials.
  3. Access Control - Lack of proper access control in password reset functionality.
This post is licensed under CC BY 4.0 by the author.