Radia Perlman

Challenge Description

Command Injection Vulnerability

let's try and put a random value in the ip parameter and see if we can generate any errors that help us to identify what we are dealing with

so the application gets the dns host and trys to query the corresponding ip using nslookup command, so the vulnerability here will be a command injection by injecting other command in the ip parameter

nslookup cyberheroines.ctfd.io 2>&1 ; ls ;

we can see that the app have executed the command ls by using the separator ;

after listing the files we find a file called flag.txt, let's try to read it using the command cat

nslookup cyberheroines.ctfd.io 2>&1 ; ls ; cat flag.txt ;

the command cat is blocked so we will bypass the restriction by using backslashes or double quote

bypass using backslashes

bypass using double quote

Flag

chctf{1_l0v3_5p4wn1n6_n0d3_ch1ld_pr0c355}

Last updated

Was this helpful?