$$ \text {An iCSI CTF (RED22)} $$

image.png

IP Address: 172.25.200.200

Port: 9033

Want to run this Docker container locally?

docker run -d -p 9033:80 --name flag-red22 --restart always joshbeck2024/ctf-har-hijack-okta-plunder-flag-red22

Before working through this lab, take a minute to read [this article.](https://thehackernews.com/2023/11/oktas-recent-customer-support-data.html#:~:text=It further noted that the,used for session hijacking attacks.)

Overview: In September and October 2023, attackers obtained credentials that granted them access to Okta's customer support resources.

In this lab, you’ll exploit information within .har files to get a feel for how the discovery of these files may be leveraged to access protected resources.

Setup:

We’ll explore this website using Burp Suite and the built-in browser this time.

Click on the ‘Register’ link on the front page:

image.png