Discovered subdomains:
web.cdu9xbn8bapxzssooudpig.exam.ns.agency
srv.cdu9xbn8bapxzssooudpig.exam.ns.agency
scm1.cdu9xbn8bapxzssooudpig.exam.ns.agency
site.scm.cdu9xbn8bapxzssooudpig.exam.ns.agency
scm.cdu9xbn8bapxzssooudpig.exam.ns.agency
Intro
(no 6843 lecture)
Break 1: *.nsnagency
(Solution)
Target: https://ssrfsquared.ns.agency/
https://ssrfsquared.ns.agency/static?r=http%3A%2F%2F127.0.0.1%3A9447%2Fstyles.css
, which can also be confirmed by viewing the source of the pageindex.html
or styles.css
https://ssrfsquared.ns.agency/static?r=http://127.0.0.1:9447/styles.css
there is a hint that something else is on the serverTarget: https://smartcontracts.dev1-x.ns.agency/contract.php
A user is able to access local files present on the server without any access controls, enabling them to view sensitive information such as the /etc/passwd
file
file:///etc/passwd
into the search bar/etc/passwd
file will then be returned, a comment at the bottom can be found stating that the flag is at /flag
This problem is so easy, it can be solved in a matter of seconds. Connect to c1.easyctf.com:12482.
So the moment I read the title and description I knew it was something like a Time-Based Blind SQL Injection
I began experimenting with different values to see if I could find a pattern ...
Blind SQL Injection
challenge, which I did not have knowledge of before (but I do now), in fact the only SQLi I knew of before this was the simple auto bypass method (basically ' OR 1=1; --
), so I'm actually glad I did this challenge til the very end because I ended up learning a lot !