$$ \text {An iCSI CTF (RED22)} $$

docker run -d -p 9033:80 --name flag-red22 --restart always joshbeck2024/ctf-har-hijack-okta-plunder-flag-red22
Overview: In September and October 2023, attackers obtained credentials that granted them access to Okta's customer support resources.
.har (HTTP Archive) files to a support portal for various purposes..har files typically contain confidential data, including session tokens..har files submitted to Okta's portal were not stripped of sensitive data, such as valid access tokens. This oversight allowed attackers to infiltrate Okta's customer resources..har files to get a feel for how the discovery of these files may be leveraged to access protected resources.