Thanks that worked! Now I am stuck again… this is taking soo much time lol
Can anyone give me a hint / PM? Is there any way to execute something?
Got it!
Who knew playing in a snake’s sandbox could be so fun. Thanks to @undefi for the nudge.
Thanks for this great challenge! ![]()
Can someone DM me a hint on how to bypass r***x? No matter how hard I try to ESCAPE I seem to to still be stuck.
@moozilla
Sometimes it is good to use something twice.
Still working on this challenge. I don’t know how to get data back.
@secabit Thanks, I managed to get that part working finally, but now I’m stuck on the same thing as you. When I run my attack against the server locally I can get a reverse shell, but it doesn’t work against the actual box. That also feels like not the intended solution since it’s a web challenge. Feel like I’m missing something obvious.
Finally got this one! Was thinking about one of snuggles’ comments and right when I starting to get SLEEPy the answer hit me.
Really enjoyed this challenge and learned lots about Python 2 (shame that it has just entered EOL so some of the learning feels a bit wasted).
I took to blindfolded sleeping to exfiltrate my flag, one wink at a time. But it looks like there are different ways to do the last step.
As an aside, I dont understand why most people have rated this challenge ‘Brainfuck’. It could have been lots harder - just search for escaping python jails and ctf, there are some truly twisted ones out there.
@seekorswim @moozilla
Thanks for help guys.
Finally done. Watch out on every step, when you’ll forget about important things then you will lost a lot of time. It is making this box hard, but I really enjoyed.
Edit: sorry, wrong topic, my bad
oh man this took me ages because of the slow af exfil…
can’t wait to go find some writeups and see if i just did it in a really stupid way lol
EDIT: yeah i wasted hours because of slow exfil ■■■■. there’s a much better way than acting blind
Woohaa got the flag! Learned a lot about python. Thanks @doxxos for the last push!
Is it possible to return value from ***k? I would appreciate it if someone can explain this part to me in PM?
I found an EC() injection point, but the R*X is filtering basically everything that I can think of. Can someone inbox me a nudge for this stage?
Really enjoyable. Thanks to @seekorswim for the guidance.
Done
I saw many here posted that their exploit worked locally but not on the remote host. I’m facing the same issue. Any nudge would be appreciated ![]()
Type your comment> @boris154 said:
I saw many here posted that their exploit worked locally but not on the remote host. I’m facing the same issue. Any nudge would be appreciated
Finally finished ![]()
If anyone else gets stuck with that issue, don’t trust your local python (especially on kali), you docker to run it and then test your exploit.
Uff… I think I know a lot about it, but… I miss the most important thing! I can’t get the site to do even a simple operation! should I forget cookies? ![]()