webProeasy
Crawler
hackerlab
Task: Web crawler application with login. Solution: Brute-forced credentials (admin:qqq111), then exploited Command Injection via unsanitized URL parameter passed to shell_exec().
$ ls tags/ techniques/
command_injectionrcephpapacheunsanitized_inputsemicolon_injectionshell_execcredential_bruteforceweb_crawlerpipe_injection
Credential brute-forcing (admin:qqq111)Command Injection via unsanitized shell_exec() inputFilesystem enumerationPipe (|) and semicolon (;) injection
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Провальный код (Failed Code)— hackerlab
- [web][Pro]Секрет (Secret)— hackerlab
- [web][Pro]Pryzhok— hackerlab
- [web][Pro]Творение безумца (Work of a Madman)— hackerlab
- [web][Pro]Базовая авторизация 2 (Basic Auth 2)— hackerlab