Challenge
Category: Web · Points: 100 · CTF: picoCTF 2026
URL: http://dolphin-cove.picoctf.net:52077/sessions
We are given a sessions endpoint and an example session:
session:VccD5CnHjooYuqCNfiWBvI-kybC0pays_8QFBWE3wjs
{'_permanent': True, 'key': 'admin'}
Analysis
The session data suggests:
- The application uses client-side session storage
- The session contains
_permanent: Trueandkey: admin - This is a strong indicator the session is encoded (likely Base64) and not securely signed
If the server trusts this session value directly, we can forge our own session.

Approach
Goal: Modify the session so that key = admin
- Inspect how the session is stored (cookie or URL)
- Decode the session value
- Modify the JSON data
- Re-encode it
- Send it back to the server
Exploit
If the session is Base64 encoded:
import base64
data = b"{'_permanent': True, 'key': 'admin'}"
encoded = base64.b64encode(data)
print(encoded)
Swap the session cookie with the forged value and reload the page.
Flag
picoCTF{s3t_s3ss10n_3xp1rat10n5_53a328ed}