webPromedium

Ghost Cloud

hackerlab

Task: File storage service with user directories named by SHA256 hash. Solution: Exploited IDOR and SQL LIKE pattern matching to access admin flag file by predicting directory path and using partial filename match.

$ ls tags/ techniques/
IDOR via predictable user directory hashSQL LIKE pattern matching exploitationAccess control bypass through partial filename matchingSHA256 hash prediction for admin directory

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups