/plushcap/analysis/supabase/supabase-how-to-hack-the-base

How to Hack the Base!

What's this blog post about?

We recently conducted our first publicly accessible hack-the-base challenge, which saw over 290 participants. The challenge involved finding nine hidden flags within a Supabase project's database, requiring various techniques such as HTML inspection, DNS queries, and exploiting schema vulnerabilities. Participants had to navigate through a series of hoops, including client-side validation, using tools like Burp Suite and cURL, to uncover the flags. The final flag required connecting to an EC2 instance in AWS, installing a Postgres client, and querying a database table to retrieve the last piece of information. Overall, the challenge provided a comprehensive introduction to web application security testing and exploitation techniques.

Company
Supabase

Date published
Dec. 20, 2024

Author(s)
Stephen Morgan

Word count
2778

Language
English

Hacker News points
None found.


By Matt Makai. 2021-2024.