Kemarin malam aku sama bapak-bapak ronda main catur sekalian nunggu sahur, liat deh, gimana gg ga?
Initial Analysis
We are given a link () to a chess game in lichess.com:
There is no obvious signs of flag. So i searched in google about chess steganography. And found this website.
From the description of the website:
This is a tool to encode/decode data in chess games. It first encodes the input data as a bignum, and then encodes the bignum in the move choices in the chess game.
Solve
We first need to dump the chess moves, we can use lichess API here:
We can then copy this Chess Notation to the Chess Steganography website. And we can get the flag!
Flag: RAMADAN{d3w4_k1p45_04109132}
Baby Pyjail
Description
Author: daffainfo
baby pyjail
Connect: nc playground.tcp1p.team 8011
Initial Analysis
We are given a single source code:
inp = input("Input pls")
if any(c in inp for c in "abcdefghijklmnopqrstuvwxyz0123456789_\"'."):
print("Invalid input!")
else:
print(eval(inp))
There's a vulnerability where our input is being eval''ed but our input is restricted to not contain these character:
abcdefghijklmnopqrstuvwxyz0123456789_\'.
Solve
One way to solve this pyjail is to use cursive text. Then we use the payload breakpoint() . When we invoke breakpoint, it will pop a Pdb (Python debugger). From there we can execute arbitrary command. I use below payload to get shell.