Agent T

Something seems a little off with the server.

TLDR

Exploit PHP/8.1.0-dev vulnerability and create remote shell.

Solution

Start by port scanning the IP with nmap:

After looking at the website I check what the hint was:

Check HTTP header with curl:

Found framework version

As I don’t figure any other vulnerability I check what exploit-db has to offer.

using the found exploits remote shell can be created to the webserver.

I open nc listener on my machine

then execute python code mentioned above.

Remote Shell Connection Done

Find the flag.txt

FLAG: flag{4127d0530abf16d6d23973e3df8dbecb}

Nice room :) Interesting story behind the exploit. Great to learn to use exploit-db in practice. Got some problems trying to connect to website after “curling” it as it was busy waiting something. Also was nice to see how the room name itself was a hint for the challenge, brilliant.