webPromedium

Обходной путь (Obhodnoy Put)

hackerlab

Task: PHP web app with code input field executing via eval(). Solution: Bypassed function blacklist (system, exec blocked) using file functions (scandir, readfile) to enumerate directories and read hidden .secret file containing the flag.

$ ls tags/ techniques/
PHP eval() code injectionFunction blacklist bypass using file functionsDirectory enumeration with scandir()Arbitrary file read with readfile()

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups