Home [RITSEC 2023] - Echoes
Post
Cancel

[RITSEC 2023] - Echoes

Do you hear that?

https://echoes-web.challenges.ctf.ritsec.club/




On main page, we have an input saying us to type a word:

img

Let’s enter a word !

img

Result:

img

By looking at the request, there is a word POST parameter containing our typed word.

img

There are not an infinite number of vulnerabilities associated with a single user input. In this challenge, there are no sessions or cookies.. so it’s useless to try a JavaScript injection, we can therefore turn to an OS command injection.

So let’s try to inject a ls :

img

And it worked !

Time to read flag.txt

img

🚩 RS{R3S0UND1NG_SUCS3SS!}

This post is licensed under CC BY 4.0 by the author.