Target from: CTF Playground

Intermediate, Non rootable, Timed

ginx / 0.0.0.0

2: Flags (2:app)
1: Service
1,310 pts
Avg. headshot: 2,407 minutes

#headshot

Level 15 / Senior CTFer

fakeIn / 78th Place

2: Flags found
1: Service discovered
1,310 pts
25 minutes

Visit the page and pay attention at the files included and their locations.

Proxying requests with user provided input can lead to catastrophic consequences. See if you can grab the flags by:

  • accessing the index.html from the internal web server http://127.0.0.1/index.html
  • by making the server perform a request to a server controlled by you

To start the challenge connect to http://10.0.14.22:1337/. Your timer starts from the first time you connect to the service.

Activity Stream

Latest activity on the platform

fakeIn managed to headshot [ginx], in 25 minutes, 4 months ago
fakeIn Got the QUERY_STRING flag of ginx for 800 points, 4 months ago
fakeIn Got a flag from ginx for 500 points, 4 months ago
fakeIn Is getting started with ginx for 10 points, 4 months ago