webPromedium
Ghost Cloud
hackerlab
Task: File storage service with user directories named by SHA256 hash. Solution: Exploited IDOR and SQL LIKE pattern matching to access admin flag file by predicting directory path and using partial filename match.
$ ls tags/ techniques/
sha256flaskpath_traversalpythonidorinsecure_direct_object_referencewerkzeugsql_like_injectionfile_storageaccess_control_bypassuser_directory
IDOR via predictable user directory hashSQL LIKE pattern matching exploitationAccess control bypass through partial filename matchingSHA256 hash prediction for admin directory
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Корпоративное хранилище (Corporate Storage)— hackerlab
- [web][Pro]Царь горы (King of the Hill)— hackerlab
- [web][Pro]Состояние 0x7F— hackerlab
- [web][Pro]Photo Storage— miptctf
- [web][Pro]SecretKeeper— hackerlab