Ringzer0 – Web Warning: Looking for Password File

Heloh again pepol

I made something! This time, it’s a file inclusion.

You knooooo, file inclusion! You can look up to a server’s directory with just the url. If you’re not so familiar with file inclusion, please read those references. Let’s start!


Okay, so we got this website.

Welp, I don’t speak that language but no one cares heuheuheuheu. What we wanna see is this:

See that ‘=’? That’s our ticket. Try to erase that ‘lorem.php’.

UUH, WHAT’S THAT? THAT’S A LINUX DIRECTORY THINGY!~

Okay, so the point is to put linux command to get out of that directory and to get into the passwd directory. You can try to see with your own linux yourself abour how many times you have to get out before you can get into passwd, but I’m just gonna search it on wikipedia bcoz I’m still a windows slave.

Input this next to the ‘=’: ../../../../../etc/passwd

../ means we get out of one directory.

Let’s try.

UWUH! That’s passwd!~ And heeere we got the flag~

Okie~ Let’s input.

Submit and see the magic

References:
https://en.wikipedia.org/wiki/File_inclusion_vulnerability


Challenge:
https://ringzer0team.com/challenges/75

Leave a Reply

Your email address will not be published. Required fields are marked *