ctf-writeup/DeadSec CTF 2023/FRSS/README.md

29 lines
874 B
Markdown
Raw Normal View History

2023-05-21 14:57:52 +00:00
# FRSS
> `-`
## About the Challenge
We got a websites that can make requests to other websites and display the response
![preview](images/preview.png)
We need to access `/hehe.txt` by using that feature. However there is a limit of characters that we can input into that form
![preview_2](images/preview_2.png)
## How to Solve?
In order to read the flag, we need to access the website internally and access the `/hehe.txt` endpoint
At first, I inputted `127.0.0.1/hehe.txt` but the response is `Oh no no, url is too long I can't handle it`. And then I and found this [payload](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Server%20Side%20Request%20Forgery/README.md)
![PayloadAllTheThings](images/PayloadAllTheThings.png)
So, my final payload was:
```
0.0.0.0/hehe.txt
```
![flag](images/flag.png)
```
dead{Ashiiiibaaa_you_hAv3_Pybass_chA11}
```