ctf-writeup/DeadSec CTF 2023/Bing
Muhammad Daffa 4adf31cf8b feat: added 0ByteCTF 2023 2023-08-21 23:33:04 +07:00
..
images feat: added 2 CTF writeup 2023-05-21 21:57:52 +07:00
README.md feat: added 0ByteCTF 2023 2023-08-21 23:33:04 +07:00

README.md

Bing

-

About the Challenge

We have been given a website that contains a form and we can input a host there

preview_1

And then I tried to input 127.0.0.1 and here was the output

preview_2

How to Solve?

We need to exploit the website using Command Injection vulnerability in order to read the flag. Here is the payload I used to read the flag

127.0.0.1;c\a\t${IFS}/f\lag.txt${IFS}|base64

Because some of the commands are blacklisted by the website (Like cat or ls), we can trick it with / character. And because whitespace is also blacklisted by the website we can use ${IFS}

flag

dead{okokok!!!_th1s_flAg_f0R_Y0U}