Target from: CTF Playground

3: Flags (2:app, env
)
1: Service
1,310 pts
Avg. headshot: 307 minutes
3: Flags found
1: Service discovered
1,310 pts
25 minutes
Everyone speaks about escaping user input to avoid injections but if you are a developer trying to actually implement a protection like this you are on your own.
The developer of this application, had all the good intentions, he even used some suggested solutions from stackoverflow.com... and we all know how well that usually goes.
To start the challenge connect with nc 10.0.14.25 1337. Your timer starts from the first time you connect to the service.
43 Headshots (newer first)
hackercon101, Touchme, Ckabos, alamillo, akdangerous, katto, c0nfirm, echoOne, Sid110307, karpik, Atlantica, doofyr, hazy, cavca2012, darklordbnl, Pablo977, jaxafed, antonioban, 4rl4dn4
uApocryphon, No0ne, noother, AskTaimoor, Twelve, D1ie3z, novena, vicky5, srrequiem, bas1c, Sev7en, ddr4ramm, Tr1s, PufferOverflow, Grosik, Pegasus, hitmanalharbi, Muzec, biba22, ElleuchX1, g0rchy, r0b0tG4nG, TheCyberGeek, mpz
1 Writeup by:
Activity Stream
Latest activity on the platform