webProeasy

Crawler

hackerlab

Task: Web crawler application with login. Solution: Brute-forced credentials (admin:qqq111), then exploited Command Injection via unsanitized URL parameter passed to shell_exec().

$ ls tags/ techniques/
Credential brute-forcing (admin:qqq111)Command Injection via unsanitized shell_exec() inputFilesystem enumerationPipe (|) and semicolon (;) injection

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups