This morning I woke up to some unfriendly ice rain, and last night’s snow covered sidewalk has turned into an ice-skating rink. Baby steps were necessary to avoid ending up in a horizontal position involuntarily. I made it to the train station safely, and got on the NYC-bound train. On the bright side, Egor Homakov (@homakov) posted a challenge on Twitter for finding the local file inclusion security hole in a piece of path validation code.
1 2 3 4 5 6 7 8 9 10 |
|
Looks like my 40 minute train ride has turned into a hacking session and I eagerly played around with the provided code to access the contents of my local etc/passwd
file. Eureka! Finally, I figured out that by breaking up ..
(parent directory) with the wildcard symbol *
, I could trick the validation code into allowing my path string. Also, in bash
the folder .*.
behaves the same as ..
, so by prepending etc/passwd
with the right number of .*./
strings, I could finally access the coveted password file.
1 2 3 4 5 6 7 8 9 10 11 12 |
|