[CTT2023] Mflag — 200 pts

Fnnnr
2 min readSep 17, 2023

--

This one is a little harder because the code is written in Flutter.

The hint stated that the developer has already retrieved the flag but do not know how to display it.

That means the flag is not in the app but is stored on the server.

Let’s try to intercept the application and read the HTTP response from the server.

Normally, we can just add the proxy and point it to our Burp proxy. However, flutter is a non-proxy aware application which means it ignores the system proxy.

To be able to intercept, we need to set up VPN server.
For me, I created a Linux VM and set up the VPN server using this script:

For more detail about how to set up the VPN, follow this link:

After we have set up a VPN and set all the routes to Burp Proxy (and set up a invisible proxy), let’s use the app again. We can see the flag in the HTTP response!

Part 1:

Part 2:

--

--

Fnnnr

Currently a penetration tester. Interested in binary exploit and RE.