webeasy

Ping Pwn

hackerdna

Task: Flask ping utility with user input passed to os.popen() without sanitization. Solution: OS command injection via semicolon separator to execute arbitrary commands as root and read flag.

$ ls tags/ techniques/
OS command injection via shell metacharactersSemicolon command separatorPipe command chainingNewline injection (%0a)

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]