Forum Discussion
Pen Test CTFs: Jinja2 Exploitation
- 3 months ago
Team,
Thank you for reaching out in some manner. The lab is surprisingly straightforward.... once you understand the vulnerability. Over the past week, this has been my soul focus and what I have learnt is so valuable.
With regards to the CTF itself, the questions truly lead you to the answer. I had most of the answers but i had to work out how to use them and for that, I had to understand them. I spent so long punished by the limited characters and adding the 'space', that I didn't even think of using the answer to 'module.function' .
Then it clicked.What could of been a 20 minute adventure has lead to some serious research and a real sense of achievement.
I can't say the answers were solutions but certainly honorable suggestions:Netcat's -
most likely the answer lies in question "8 What Python module and function allows you to access arguments in the query string?
Steven's -
learn, how you can access the config register
Config, Strings, Objects and Variables for the win.
While I didn't solve it, most likely the answer lies in question "8 What Python module and function allows you to access arguments in the query string?". There you are not limited in the syntax, but if it was that easy I would have solved it.
It is a cheeky one.
Without giving the answer up ive ran through everything using this module.funct but because of the strict email template i cant get much further. i can get it to reflect but not render/process anything.
Email rules and 50 max characters has me stumped.
- netcat3 months ago
Silver III
Just solved my first PenTest lab. And I think it's impossible to give more hints, without revealing the solution. Maybe...as I already guessed, the questions in the lab point you to some things that are needed to complete the last question, but not to the solution itself. It's time to try and experiment.