webmedium

Ghost Cloud

hackerlab

Task: File storage service with user directories named by SHA256 hash. Solution: Exploited IDOR and SQL LIKE pattern matching to access admin flag file by predicting directory path and using partial filename match.

$ ls tags/ techniques/
IDOR via predictable user directory hashSQL LIKE pattern matching exploitationAccess control bypass through partial filename matchingSHA256 hash prediction for admin directory

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]