ctf-writeup/2023/DeadSec CTF 2023/Bing
daffainfo e6c48e50f1 feat: grouped the challs 2024-01-09 16:59:32 +07:00
..
images feat: grouped the challs 2024-01-09 16:59:32 +07:00
README.md feat: grouped the challs 2024-01-09 16:59:32 +07:00

README.md

Bing

-

About the Challenge

We were given a website that contains a form and we can input a host there

preview_1

And then I tried to input 127.0.0.1 and here was the output

preview_2

How to Solve?

We need to exploit the website using Command Injection vulnerability in order to read the flag. Here is the payload I used to read the flag

127.0.0.1;c\a\t${IFS}/f\lag.txt${IFS}|base64

Because some of the commands are blacklisted by the website (Like cat or ls), we can trick it with / character. And because whitespace is also blacklisted by the website we can use ${IFS}

flag

dead{okokok!!!_th1s_flAg_f0R_Y0U}