webProeasy

Ping Pwn

hackerdna

Task: Flask ping utility with user input passed to os.popen() without sanitization. Solution: OS command injection via semicolon separator to execute arbitrary commands as root and read flag.

$ ls tags/ techniques/
OS command injection via shell metacharactersSemicolon command separatorPipe command chainingNewline injection (%0a)

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups