Hellow hackers hope you guys are doing well, had a chance to participate into HTB latest CTF,learned a lot with this CTF especially most web challenges,lemme share with you how i managed to solve few web challenges other of categories I managed to solve can be found on the other blog post which can be found here writteup
Image Not Showing
Possible Reasons
- The image was uploaded to a note which you don't have access to
- The note which the image was originally uploaded to has been deleted
Learn More →
Image Not Showing
Possible Reasons
- The image was uploaded to a note which you don't have access to
- The note which the image was originally uploaded to has been deleted
Learn More →
This was a 3-4 days heavy CTF challenge, lets check how i managed to solve few web challenge
WEB CHALLENGES
Flag Command
description
Image Not Showing
Possible Reasons
- The image was uploaded to a note which you don't have access to
- The note which the image was originally uploaded to has been deleted
Learn More →
solution
First thing start an instance and copy the ip and port number to your browser, as usually the first thing we need to understand how the site works
Image Not Showing
Possible Reasons
- The image was uploaded to a note which you don't have access to
- The note which the image was originally uploaded to has been deleted
Learn More →
Went direct to my burp suite and see how i can exploit this, after spending some a while with this trying to exploit on the browser, but realized that approach was an insane one, decide to use a simple with the burp suite.
Image Not Showing
Possible Reasons
- The image was uploaded to a note which you don't have access to
- The note which the image was originally uploaded to has been deleted
Learn More →
N/B: from the history on burp we can see an API that was interesting one lets foward it to the repeter very fast.
Image Not Showing
Possible Reasons
- The image was uploaded to a note which you don't have access to
- The note which the image was originally uploaded to has been deleted
Learn More →
and i saw this strange word "secret", so i decide to capture a request while typing the command "HEAD NORTH"
Image Not Showing
Possible Reasons
- The image was uploaded to a note which you don't have access to
- The note which the image was originally uploaded to has been deleted
Learn More →
lets modify it with the secret command we saw earlier, it will look like this.
Image Not Showing
Possible Reasons
- The image was uploaded to a note which you don't have access to
- The note which the image was originally uploaded to has been deleted
Learn More →
And there we got the flag.
KORP Terminal
Description
Image Not Showing
Possible Reasons
- The image was uploaded to a note which you don't have access to
- The note which the image was originally uploaded to has been deleted
Learn More →
Solution
As usually were a given a docker instance here, spawn it and see what we have on the ip and port number.
Image Not Showing
Possible Reasons
- The image was uploaded to a note which you don't have access to
- The note which the image was originally uploaded to has been deleted
Learn More →
Got a login page, the first think i thought was to bypass the login page with the SQL injection via the username field and password field. Mhmmmmmmmm
While Testing the login pagee with SQL injection i observed unusual behavior in the username field, There are some payload showed me that the username is 'admin' the only field were missing is the password field(How do we get into that???).
The other error was this one, which showed me that the login page is vulnerable to SQL injection.
Image Not Showing
Possible Reasons
- The image was uploaded to a note which you don't have access to
- The note which the image was originally uploaded to has been deleted
Learn More →
N/B: After much time testing on how to bypass this i realized that also SQL injection can be used for other issues, like extracting the database and so oninstead of continue spending time much other time bypassing this one.
I decided to automate this with sqlmap so i saved the request into a file and started testing into my terminal.
Lets read the error well what is concerned, if we read this line carefully it says that invalid creds(that is true) and at the end it says we can ignore this with a "–ignore-code"
Decided to add this option at the End of my first command
Image Not Showing
Possible Reasons
- The image was uploaded to a note which you don't have access to
- The note which the image was originally uploaded to has been deleted
Learn More →
Now it started working LOL,i waited sqlmap to finish this task
decided to take dump the korp_terminal database
Image Not Showing
Possible Reasons
- The image was uploaded to a note which you don't have access to
- The note which the image was originally uploaded to has been deleted
Learn More →
And we can see a browfish encypted password
lets crack it with hashcat, I cracked it when i was solving the challenge
Image Not Showing
Possible Reasons
- The image was uploaded to a note which you don't have access to
- The note which the image was originally uploaded to has been deleted
Learn More →
Now we got the credentials we can try to login in
Image Not Showing
Possible Reasons
- The image was uploaded to a note which you don't have access to
- The note which the image was originally uploaded to has been deleted
Learn More →
TimeKORP
Description
Image Not Showing
Possible Reasons
- The image was uploaded to a note which you don't have access to
- The note which the image was originally uploaded to has been deleted
Learn More →
Solution
Download the files and at the same time start an docker instance so as we can interact with a challenge.
Image Not Showing
Possible Reasons
- The image was uploaded to a note which you don't have access to
- The note which the image was originally uploaded to has been deleted
Learn More →
Its a time machine,took me a while understand how to exploit it, I decided to go and read the source code again and found this code
Image Not Showing
Possible Reasons
- The image was uploaded to a note which you don't have access to
- The note which the image was originally uploaded to has been deleted
Learn More →
I reviewed the source and realized that the date command allow us to execute command, so we can try to break the retriction of executing our command also by command injection
Image Not Showing
Possible Reasons
- The image was uploaded to a note which you don't have access to
- The note which the image was originally uploaded to has been deleted
Learn More →
Now lets find the flag as we have successful exploit the vulnerability
N/B: findind the flag was also another challenge here, i spent like 20-30 minutes finding it, so i decided to check a docker file and see if i can get it, course withine a docker image u will see what command are allowed and what have been disallowed, lets see
At the bottom we can see that the flag was copied to a root directory so we can get the flag from root directory like this

