I know that this server is vulnerable, but I can't exploit it. Show your skills and find the right file.
Target URL: http://X.X.X.X/4HOF3DTV
[IP redacted]
Visiting the provided URL takes you to http://X.X.X.X/4HOF3DTV/?page=home.php
, which is blank, but looks like it's vulnerable to a directory traversal attack.
I tried ?page=../../../
and other simple attacks, but it did not work, which means they had some simple filtering in place to prevent such attacks.
However, let's press on – to help me, I used the DotDotPwn fuzzing tool to generate and check for possible traversals:
I set the -q
switch so it would only print the vulnerable results.
By default, this tool looks for the string root:
in /etc/passwd
to find the passwords file. I wasn't sure if the flag would be in that file, but I figured that if it wasn't, I could explore more after finding a suitable method of entry.
However, it turns out that the flag was in /etc/passwd
, and visiting any URL found by the tool gives us the flag.
CDDC21{!_like_the_PASSWD-F!le!}