webeasy
Ping Pwn
hackerdna
Task: Flask ping utility with user input passed to os.popen() without sanitization. Solution: OS command injection via semicolon separator to execute arbitrary commands as root and read flag.
$ ls tags/ techniques/
OS command injection via shell metacharactersSemicolon command separatorPipe command chainingNewline injection (%0a)
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]