Nullcon CTF 2023
https://ctftime.org/event/1900
Challs
Category | Challenge |
---|---|
Web | reguest |
Web | zpr |
reguest
Description
Desc: HTTP requests and libraries are hard. Sometimes they do not behave as expected, which might lead to vulnerabilities.
http://52.59.124.14:10014
We can send an HTTP GET request using the cURL utility to the address http://52.59.124.14:10014, including a cookie in the request header.
The -b argument is used to specify the cookie that will be included in the request header. The value of the cookie is role=admin; really=yes
. This cookie can be used by the server for authentication or other settings.
In this case, the request is targeted to a web service that requires authorization at the ‘admin’ level and requests confirmation from the user (‘really=yes’).
Or use this simple payloads
Flag
ENO{R3Qu3sts_4r3_s0m3T1m3s_we1rd_dont_get_confused}
zpr
Description
My colleague built a service which shows the contents of a zip file. He says there’s nothing to worry about….
http://52.59.124.14:10015 + http://52.59.124.14:10016
Create a txt file coba.txt
that has text ../../../flag
indicate as the path. The soft link will refer to the original file, so changes made to the original file will also be visible in the symlink.
The coba.txt
file will be blank and it turn into a symlink
coba.txt
Then zip into file named test.zip
that contains the file coba.txt
. The –symlink argument in this command indicates that the soft link coba.txt will be included in the zip file. Send the test.zip file to the server using the POST method with the help of the curl library.
Make an HTTP GET request to the server https://52.59.124.14:10016
to access the file coba.txt
located in the directory. In the HTTP request header, the -v argument in the curl command indicates that the displayed output will include verbose information about the HTTP request process. Therefore, in addition to the contents of the coba.txt file, the output of the curl command will display information such as status code, header, and server response time.
Final script solver
Running
Flag
ENO{Z1pF1L3s_C4N_B3_Dangerous_so_b3_c4r3ful!}