$ whoami
Home
  • 분류 전체보기 (116)
    • Exploit (9)
      • Tools (2)
      • Exploit (5)
      • Bug Bounty (2)
    • Wargame (82)
      • HackCTF (15)
      • XSS game (6)
      • Dreamhack (2)
      • Webhacking.kr (7)
      • XSS Challenges (8)
      • H4CKING GAME (3)
      • 정보보호영재교육원 (1)
      • Lord of SQL Injection (40)
    • CTF (25)
      • YISF 2022 (2)
      • CBHC 2022 (1)
      • HeroCTF v4 (2)
      • corCTF 2022 (2)
      • Aero CTF 2022 (0)
      • BDSec CTF 2022 (4)
      • San Diego CTF 2022 (5)
      • WACon 2022 Qualifier (1)
      • Cyber Conflict Exercise 202.. (4)
      • DiceCTF 2023 (1)
      • Incognito 4.0 (3)
Home
  • 분류 전체보기 (116)
    • Exploit (9)
      • Tools (2)
      • Exploit (5)
      • Bug Bounty (2)
    • Wargame (82)
      • HackCTF (15)
      • XSS game (6)
      • Dreamhack (2)
      • Webhacking.kr (7)
      • XSS Challenges (8)
      • H4CKING GAME (3)
      • 정보보호영재교육원 (1)
      • Lord of SQL Injection (40)
    • CTF (25)
      • YISF 2022 (2)
      • CBHC 2022 (1)
      • HeroCTF v4 (2)
      • corCTF 2022 (2)
      • Aero CTF 2022 (0)
      • BDSec CTF 2022 (4)
      • San Diego CTF 2022 (5)
      • WACon 2022 Qualifier (1)
      • Cyber Conflict Exercise 202.. (4)
      • DiceCTF 2023 (1)
      • Incognito 4.0 (3)
블로그 내 검색
CONTACT

HACKINTOANETWORK

WEB APPLICATION BUG HUNTER, PENETRATION TESTER

  • CTF/Incognito 4.0

    [Incognito 4.0] get flag2

    2023. 2. 19.

    by. hackintoanetwork

    This CTF challenge is an SSRF challenge with some additional filtering compared to the "get flag1" challenge that was previously solved.

    The challenge provides a URL form where a user can input a URL, and the goal is to bypass the filtering and trigger an SSRF attack.


    Payload

    http://0x7f.0x00.0x00.0x01:9001/flag.txt

    The payload used to trigger the SSRF attack is the URL "http://0x7f.0x00.0x00.0x01:9001/flag.txt".

    In this URL, the "0x7f.0x00.0x00.0x01" part represents the localhost IP address.


    Exploit

    By inputting this URL into the form,

    the challenge is to bypass the filtering and successfully trigger an SSRF attack to read the contents of the "flag.txt" file located on a server running on localhost at port 9001.

    FLAG : ictf{l0c4l_byp4$$_323theu0a9}
    저작자표시 비영리
    • 카카오스토리
    • 트위터
    • 페이스북

    'CTF > Incognito 4.0' 카테고리의 다른 글

    [Incognito 4.0] massive  (0) 2023.02.19
    [Incognito 4.0] get flag 1  (0) 2023.02.19
    get flag2, Incognito 4.0, SSRF, web hacking

    댓글 0

    관련글

    • [Incognito 4.0] massive 2023.02.19
    • [Incognito 4.0] get flag 1 2023.02.19
    맨 위로
전체 글 보기
Tistory 로그인
Tistory 로그아웃
로그아웃 글쓰기 관리

Today 0

Total 13,024

Powered by hackintoanetwork

Designed by Nana
블로그 이미지
hackintoanetwork

티스토리툴바