INSCTF20Q LowDeep

Challenge

Try out our new ping platform: http://lowdeep.insomnihack.ch. (Note: Only works with HTTP)

Solution

lowdeep.insomnihack.ch.webp

lowdeep.insomnihack.ch1.webp

Interesting, it allows ips and hostnames. It behaves like ping itself. Maybe we need to try a Remote Code Execution attack here.

Let's see if it attempts to interpret other commands with: localhost;ls

lowdeep.insomnihack.ch2.webp

lowdeep.insomnihack.ch3.webp

Unfortunately, we can't just use cat.

lowdeep.insomnihack.ch4.webp

So let's visit the page instead: http://lowdeep.insomnihack.ch/print-flag

And we get the following file: print-flag

$ file print-flag
print-flag: ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/l, for GNU/Linux 3.2.0, BuildID[sha1]=72c589834f878a6a3267944f305c29166a1ace8b, stripped
$ chmod +x print-flag
$ ./print-flag
INS{Wh1le_ld_k1nd_0f_forg0t_ab0ut_th3_x_fl4g}

Flag

INS{Wh1le_ld_k1nd_0f_forg0t_ab0ut_th3_x_fl4g}