CTF Writeup
-
Check the alertBox it looks like a path to some directory...
-
One of the URL linked there has parameter "id" and the value was 1. I tried SQL injection with many tempore scripts but no luck. After a few times I got the hint that not every parameter is vulnerable to SQL injection. Hence I tried file retrieval and it was a success.
- From /etc/passwd we have the user "munna". But what is the password??? Let's check Bash History for clues...
-
Looks like the user have typed password along with passwd command without giving enter.(or at least the CTF builder wants to tell us that). SSH Done. It was RBash. The PATH variable lead me to this directory and the available commands were very few. Also, we have an interesting language that we can use "LUA".
-
Once I am out of RBash I tried grep command and two flags at once...