In source code we can see one image
viewing this image we get the flag
flag: ^FLAG^05f132dbc0e8a0cbb312952e6703e8f4703e921669676a096b385a49b34c94b2$FLAG$
number of flag: 4
Here we have functionality to create page in that using the payload: <img src=xx onerror=alert(1)>
in body will create an alert pop-up and it will give us the first flag in source code, and using this same payload in title will give us the second flag but it will be executed in home page.
Flag 1: ^FLAG^94f26fe56dec79812241c348ed6b5718a9e00fc2df643403fef30f6c0e8faee1$FLAG$
Flag 2: ^FLAG^bd75d9a3aba5709358c413cd1f69819783524094e15dd117c569bdb9f0006a06$FLAG$
- SQLi in
https://6b6c2ec7bb58b712c873fbbd19cd1a32.ctf.hacker101.com/fetch?id=1
- File read via SQLi
https://6b6c2ec7bb58b712c873fbbd19cd1a32.ctf.hacker101.com/fetch?id=4+UNION+SELECT+'main.py'--
- RCE via modifying
filename
column inphotos
table
- php code injection in
Add comment
- to auth bypass remove auth from admin.auth.inc
- to access the injected php code visit
?page=http://localhost/index
- edit other users post
- make other user's post private and access private post of other users
- delete other user's post id is md5
- session cookie id is md5 of 3 change to 2
- session cookie id is md5 of 3 change to 1
- brute force post id 945 give flag
- while creating the post change the id in post data to create post as other user