webPromedium
Art is an explosion (Искусство — это взрыв)
duckerz
Task: Web application with MongoDB backend exposing shop API. Solution: NoSQL injection via $where operator in GET /api/shop/{id} endpoint to find hidden record containing base64-encoded flag image.
$ ls tags/ techniques/
base64_decodenosql_injectionmongodb_where_bypass
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Nova Arts— hackerlab
- [web][Pro]Документальный архив (Documentary Archive)— hackerlab
- [web][Pro]90 - Самое надежное хранилище (The Most Secure Storage)— duckerz
- [web][Pro]Печеньки с молочком (Cookies with Milk)— duckerz
- [web][Pro]Сила воли (Willpower)— duckerz