+The first hash is easy enough to guess; it's `admin`. The second one, however, is a bit more difficult. But we don't need to run it through a password cracker like [John the Ripper](https://en.wikipedia.org/wiki/John_the_Ripper). Using a `==` comparitor operator in PHP has a long-known pitfall, known as "magic hashes." Thankfully, WhiteHat Security has [published a table](https://www.whitehatsec.com/blog/magic-hashes/) of magic hashes and a description about this `==` operator pitfall. Notably the only `tiger128,4` entry in this table has a magic hash number of `479763000`, and this works! Enter `admin` as the username and `479763000` as the password, and we get the flag: `dctf{It's_magic._I_ain't_gotta_explain_shit.}`
0 commit comments