CTF-challenges-by-me

Hall Of Fame

URL

l4w.pw/🤔/

Type

PHP CTF-style challenge.

How to construct command following the rules.

Trick to run weird command or abusing PHP syntax.

I already removed curl wget telnet`.

Solution

This challenge came by when I was solving a PHP sandbox challenge which has limited characters/blacklist functions/…I believe my solution was unintended, so wanna introduce to you guys.

I left backstick, to see amazing tricks from you guys.

You should notice there is INVISIBLE SEPARATOR at 9th line

All of them can be found at: writeup

There are serveral solutions:

Abusing backstick:

Abusing ssh / busybox

It … surprised me

PHP syntax abusing

By using bitwise &, we can make a string following the rule regexp \w{4}, then use { as a name of variable ${}, also access array index $array{index}