home / devploit

Personal page about infosec stuff and projects.

Home Posts Repositories Wiki About
4 April 2019

repeaaaaaat - encryptCTF

by devploit

0x01 Challenge:

Level: Easy



Can you repeaaaaaat?
author: codacker

0x02 Write-up:

We start by visiting the URL where we can see a static website with the same image repeated infinitely.


If we check the source code we can see an interesting base64 code that is changing randomly after every website refresh.


After many refreshes we have these base64 codes.

<!-- d2hhdF9hcmVfeW91X3NlYXJjaGluZ19mb3IK -->
<!-- L2xvbF9ub19vbmVfd2lsbF9zZWVfd2hhdHNfaGVyZQ== -->
<!-- Lz9zZWNyZXQ9ZmxhZw== -->

We try to decode them to see what each one gives us.

<!-- d2hhdF9hcmVfeW91X3NlYXJjaGluZ19mb3IK -->
[+] Decoded from Base64 : what_are_you_searching_for

We visit the website with the specified route and find another b64 code.

[+] Decoded from Base64 : https://www.youtube.com/watch?v=5rAOyh7YmEc

It seems to be a YouTube video with nothing important… RABBIT HOLE!

Proceed with the next base64 achieved on the home page.

<!-- L2xvbF9ub19vbmVfd2lsbF9zZWVfd2hhdHNfaGVyZQ== -->
[+] Decoded from Base64 : /lol_no_one_will_see_whats_here

Once again we visit the URL and we get a new code.

[+] Decoded from Base64 : https://www.youtube.com/watch\?v\=PGjLhOhMLXc

We get another no sense YouTube URL… ANOTHER RABBIT HOLE?! Let’s proceed with the last code obtained…

<!-- Lz9zZWNyZXQ9ZmxhZw== -->
[+] Decoded from Base64 : /?secret=flag

This code does seem to have something interesting… But there’s nothing special about the web code we visited… at least at first glance.

Searching and although the name and the statement do not seem to talk about injection, we start to try different types until we see that it is an injectable Jinja2.

Example of injection check in Jinja2:


Knowing the way forward, exploitation is easily found with a Google search about this python template.

To see all the files that are in the directory we must use the following injection.


Finally, knowing the file that we want to list, we just have to do one more injection for it :)


Flag: encryptCTF{!nj3c7!0n5_4r3_b4D}

tags: ctf - encryptctf - web - jinja2 - injection