Skip to content

Latest commit

 

History

History
 
 

Calculator

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 
 
 

Calculator

Author: Marin Radu


Description

Exploit an eval injection vulnerability by bypassing blacklists to read flag.txt.

Requirements

  • Eval injection
  • Blacklist bypass

Solve

Bypass the server's blacklist checks for the flag keyword by manipulating string cases or using alternative expressions. Connect to the server using netcat, and then craft a payload that reads flag.txt without triggering the blacklist:

# Sample Payload
open("FLAG.txt".lower()).read()

Execute this payload by sending it to the server after connecting with netcat:

nc chal.chronossec.site 30020

Flag: CSCTF{well_d0ne_kidd0}