webProeasy
Состояние 0x7F
hackerlab
Task: Flask app with source code, hint about 0x7F (127 = DEL = ghost input). Solution: Blind SSTI in Jinja2 - password field is rendered as template via from_string().render(), result saved as hash. Exploit by registering with SSTI payload and logging in with computed result, or use reverse shell.
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Конвертер (Converter)— hackerlab
- [web][Pro]Lucky Ticket (Счастливый билет)— hackerlab
- [web][Pro]Поздравительное приложение (Greeting App)— hackerlab
- [web][free]Guild— hackthebox
- [web][Pro]В поисках капибары — Hackerlab— hackerlab