webProeasy
Ping Pwn
hackerdna
Task: Flask ping utility with user input passed to os.popen() without sanitization. Solution: OS command injection via semicolon separator to execute arbitrary commands as root and read flag.
$ ls tags/ techniques/
OS command injection via shell metacharactersSemicolon command separatorPipe command chainingNewline injection (%0a)
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [misc][Pro]Калькулятор— hackerlab
- [misc][Pro]Obezbashenniy (Obez-bash-enniy)— hackerlab
- [web][Pro]Crawler— hackerlab
- [web][Pro]Simple Web (d5c47306-5d4f-4ad4-958f-5414a0b85b9b)— hackerlab
- [web][Pro]Странный сервер (Strange Server)— hackerlab