webPromedium
Vault
tamuctf
Task: Laravel app with avatar upload using $_FILES['full_path'] (LFI) and voucher redeem using decrypt() (deserialization). Solution: Chain LFI to extract APP_KEY, generate phpggc gadget chain, encrypt with Laravel format, trigger RCE to find randomized flag filename, read flag via LFI.
$ ls tags/ techniques/
lfi_via_full_pathlaravel_decrypt_deserializationphpggc_gadget_chainapp_key_extraction
π
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]ΠΠ²Π΅Π·Π΄Π½ΡΠΉ ΡΠ΅ΠΉΡ (Star Safe)β hackerlab
- [web][Pro]Lab 162 β VaultDrop β File Upload Race Condition (TOCTOU)β hackadvisor
- [web][Pro]Revenge Uploadβ hackerlab
- [web][Pro]Lab 307 β CrewHub β File Upload RCE via Polyglot JPG/PHPβ hackadvisor
- [web][Pro]Lab 354 β VaultAPI β JWT Authentication Bypass via JWE-Wrapped PlainJWTβ hackadvisor