P4CTF 2022

2022. 11. 6. 22:15·🚩 CTF/Former Doc

● Cvg3n3rat0r

This is the main page.

If I write down some words and click the submit, you can download a file.

The result file is like this. I don't have much ideas, so I simply tried some code in there.

Test Code
Result

There is nothing in result file. In this case, I can assume two situations. First, the service has word filtering. Second, the service recognized script tag and apply it in appropriate way. I thought this service has no filtering, so I try another tag to read "/flag.txt" file.

 

<iframe src="file:///flag.txt"></iframe>

Flag

p4{I_swear_the_input_was_sanitized!}

 

● V

 

Ongoing...

저작자표시 비영리 변경금지 (새창열림)
'🚩 CTF/Former Doc' 카테고리의 다른 글
  • BuckeyeCTF 2022
  • TsuckuCTF 2022
  • WreckCTF 2022
  • CCE 2022 Review
Cronus
Cronus
Offensive Security Researcher
  • Cronus
    Cronus
    Striving to be the best.
    • 분류 전체보기 (251)
      • AboutMe (1)
      • Portfolio (1)
        • Things (1)
      • Bug Report (1)
      • 🚩 CTF (23)
        • Former Doc (9)
        • 2023 (9)
      • 💻 Security (5)
      • 🖌️ Theory (22)
        • WEB (9)
        • PWN (13)
      • 📄 Project (6)
        • Edu_Siri (6)
      • Dreamhack (156)
        • WEB (95)
        • PWN (41)
        • Crypto (14)
        • ETC (6)
      • Wargame (22)
        • HackCTF (22)
      • Bug Bounty (1)
        • Hacking Zone (1)
      • Tips (7)
      • Development (2)
        • Machine Learning & Deep Lea.. (1)
      • Offensive Tools (1)
  • 블로그 메뉴

    • 홈
  • 링크

  • 공지사항

  • 인기 글

  • 태그

    RCE
    bug hunter
    cache poisoning
    sqli
    pwntools
    ubuntu 명령어
    bug report
    TsukuCTF2022
    Remote Code Execution
    python
    TFCCTF2022
    cache
    Crypto
    Deep learning
    Text Summarization
    Machine Learning
    GPNCTF
    Ubuntu 기초
    Ubuntu 기초 셋팅
    justCTF
  • 최근 댓글

  • 최근 글

Cronus
P4CTF 2022
상단으로

티스토리툴바