OWASP top 10 vulnerabilities CTF lesson – Insecure Cryptographic Storage

CTF365 lesson is based upon OWASP top 10 vulnerabilities which is still valid in 2020. The following are the lessons that are provided by CTF365. Let me tell you they are not only top 10, instead the list is of top 11 and please note they are not in any order. You can signup security shepherd using CTF365 account and start learning.

1. Broken Session Management
2. Cross Site Request Forgery (CSRF)
3. Cross Site Scripting (XSS)
4. Failure to Restrict URL Access
5. Insecure Cryptographic Storage
6. Insecure Direct Object References
7. Poor Data Validation
8. Security Misconfiguration
9. SQL Injection (SQLi)
10. Untrusted Input
11. Unvalidated Redirects and Forwards

5. Insecure Cryptographic Storage

The short description has been given in the page itself but if you want to read more about it then you can always checkout the official OWASP page where they have described it more. Please click here to go to the link.

The task here is as follows

The decision has been made that the result key to this lesson should not be publicly available. To achieve this, the development team have decided to encode the result key with base64… recover it to complete the lesson. 

The task is easy we just need to decode the given string with base64. We can either to it using online tools or if you are a Linux user then you can simply run the following command

Paste the above output and complete the lesson.

Leave a Reply

Your email address will not be published. Required fields are marked *