29 lines
874 B
Markdown
29 lines
874 B
Markdown
|
# FRSS
|
||
|
> `-`
|
||
|
|
||
|
## About the Challenge
|
||
|
We got a websites that can make requests to other websites and display the response
|
||
|
|
||
|
![preview](images/preview.png)
|
||
|
|
||
|
We need to access `/hehe.txt` by using that feature. However there is a limit of characters that we can input into that form
|
||
|
|
||
|
![preview_2](images/preview_2.png)
|
||
|
|
||
|
## How to Solve?
|
||
|
In order to read the flag, we need to access the website internally and access the `/hehe.txt` endpoint
|
||
|
|
||
|
At first, I inputted `127.0.0.1/hehe.txt` but the response is `Oh no no, url is too long I can't handle it`. And then I and found this [payload](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Server%20Side%20Request%20Forgery/README.md)
|
||
|
|
||
|
![PayloadAllTheThings](images/PayloadAllTheThings.png)
|
||
|
|
||
|
So, my final payload was:
|
||
|
```
|
||
|
0.0.0.0/hehe.txt
|
||
|
```
|
||
|
|
||
|
![flag](images/flag.png)
|
||
|
|
||
|
```
|
||
|
dead{Ashiiiibaaa_you_hAv3_Pybass_chA11}
|
||
|
```
|