Don't like this style? Click here to change it! blue.css

LOGIN:
Welcome .... Click here to logout

Speedruns

I'd like to give you a flurry of useful CTF web exploits that are handy to be aware of:

Local File Inclusion

So it's common that some loophole in the setup of an app will give you access to files you shouldn't be able to get.

When that happens you should fish around for flag.txt or ../../../../etc/passwd or look at your own server's file structure and decide where the goods are and fish for that.

Flag 1: https://dtctf.herokuapp.com/

A variation: exposed .git directory

I think I'll just let the flag speak for itself:

Flag 2: https://pswd.fsg.opalstacked.com/

Type Juggling

So PHP type juggling is funky:

Classic Stuff

Serialization

So a common exploit comes from pickling payloads. Here's what I mean:

Often we need to store a state in text, like a JSON object in localStorage, or data in a cookie. Then the program must parse that JSON object. The issue is that most of the time that object can be tampered with by users, and there are nefarious issues with malicious objects being unserialized (unpickled).

Here are several articles we're going to look over quickly:

Dig this Python article.

Now let's look at these one by one

https://www.evonide.com/fuzzing-unserialize/

My version: https://pickledrick.herokuapp.com/

OK let's do it. Head to http://websec.fr/ and tackle level 20. Here's a HUGE hint. The payload to get unserialized is: (check source when ready, don't spin wheels for too long).

You can also try problems 4 and 18 for practice.

Here is a more complex writeup: https://medium.com/bugbountywriteup/fireshell-ctf-2019-web-vice-writeup-2deee8d82556