[Hack The Boo] Day 2 Challenges
by - Thursday, January 1, 1970 at 12:00 AM
thanks!
Reply
(October 23, 2022, 03:21 PM)Hacker2222 Wrote: web challenge:
ssti in mako templates


thank you
Reply
Thanks,!
Reply
sweet
Reply
thanks
Reply
thanks
Reply
thanks
Reply
thanks
Reply
thank you
Reply
(October 23, 2022, 04:33 PM)Meep Wrote:
(October 23, 2022, 04:13 PM)tryingNew1 Wrote:

(October 23, 2022, 03:37 PM)Meep Wrote: A hint for Pwn: p.send(b'\xc9\x07\xcc\x00\x00\x00\x00\x00' + b'
')


pls be more specific


Use pwntools for python3, walk the program. My instructions to get the flag are T -> S -> \xc9\x07\xcc\x00\x00\x00\x00\x00 -> R -> L -> C. Don't forget newlines. Or use something to write the bytes as characters over nc.


Very cool. I'm curious, though, how you found that input value. When I tried it via netcat manually, I always ended up with values far away from 13371337. Is there a method/tool that can generate the correct sequence based on the desired values or did you brute force it until the value was correct?
Reply


 Users viewing this thread: [Hack The Boo] Day 2 Challenges: No users currently viewing.