Readit News logoReadit News
seadog007 commented on Break another CTF by taking over its machine   github.com/seadog007/noxC... · Posted by u/seadog007
da02 · 7 years ago
Could this have been harder to do if the insecure server inspected the HTTP content-type and response body in the response? Something like this (psuedo-code):

  if response.content_type =~ /image-/i && !plain_text?(response.body)
    pass
  else
    fail!()
  end

seadog007 · 7 years ago
I could be, but I really don't know the designed solution.
seadog007 commented on Break another CTF by taking over its machine   github.com/seadog007/noxC... · Posted by u/seadog007
holyjaw · 7 years ago
I'm a bit confused by this:

> The challenge has kubernetes logo on the bottom of the page like the screenshot below, and the IP is 35.241.245.36.

> I immediately realized that is a GCP machine, so I tested the backend server by sending HTTP request to my server to see if it is also on GCP, and it is.

What about the IP address or k8s logo made you realize it was a GCP machine?

seadog007 · 7 years ago
I think both make me think this is a GCP machine. like if you see a A record point to 104.xx.xx.xx, then you might think this is a Cloudflare protected record.
seadog007 commented on Break another CTF by taking over its machine   github.com/seadog007/noxC... · Posted by u/seadog007
meowface · 7 years ago
SSRF should be well known to anyone familiar with web app vulnerabilities, and PostScript is a programming language that's been around since 1982. Not exactly arcane terms. And noxCTF can reasonably be assumed to be a security CTF competition, even if you aren't familiar with the specific CTF.
seadog007 · 7 years ago
Well, I think if all developer know about these vulnerabilities, then there are no more bug bounty that we can play. Then it might be helpful to put some intro of these terms.

But still, I except people who click the link should already understand these terms.

seadog007 commented on Break another CTF by taking over its machine   github.com/seadog007/noxC... · Posted by u/seadog007
ryandrake · 7 years ago
> When I was play noxCTF 2018, I saw a challenge named PSRF, then I thought that might be SSRF, PostScript, or both.

Wow, talk about having no context! You need to do at least three Google searches just to parse the first sentence.

EDIT: Realized my comment was not constructive. For context, might be helpful to make some of the acronyms into links!

seadog007 · 7 years ago
I just added a brief intro. I don't think everyone should understand the technique detail, but if that want, they will
seadog007 commented on Break another CTF by taking over its machine   github.com/seadog007/noxC... · Posted by u/seadog007
seadog007 · 7 years ago
Sorry about that, what is your suggestion?
seadog007 · 7 years ago
Before your reply, I will add some explain for these terms
seadog007 commented on Break another CTF by taking over its machine   github.com/seadog007/noxC... · Posted by u/seadog007
ryandrake · 7 years ago
> When I was play noxCTF 2018, I saw a challenge named PSRF, then I thought that might be SSRF, PostScript, or both.

Wow, talk about having no context! You need to do at least three Google searches just to parse the first sentence.

EDIT: Realized my comment was not constructive. For context, might be helpful to make some of the acronyms into links!

seadog007 · 7 years ago
Sorry about that, what is your suggestion?
seadog007 commented on GPG signature verification   github.com/blog/2144-gpg-... · Posted by u/edward
seadog007 · 10 years ago
That's cool

u/seadog007

KarmaCake day32September 24, 2015
About
[ my public key: https://keybase.io/seadog007; my proof: https://keybase.io/seadog007/sigs/fSJIdMtG329CS05_xb3JQHrTuNBCpwZSrckfgSeti0A ]
View Original