Calculat3 M3
80 points Hard

Here! http://web.ctflearn.com/web7/ I forget how we were doing those calculations, but something tells me it was pretty insecure.

Flag
Rating 4.29
5
4
3
2
1

Discussion

that gave me a hard time breathing like 90% of cybers would go for xss and sql injections even in the expression field , most of us tried the to exploit the "id" sqli method

0

that was... so much easier than I was making it. deleting readonly or hitting up console with a document.getElementById('d').removeAttribute('readonly'); cantrip helps. from there jus try injecty stuff

0

I gotta say the chall is too easy that it is too hard !

0
Protected
0

Ok this one was pretty hard

0

the challenge is Broken :(

0

simple stuff

0

I actually enjoyed this one, although I am very peeved by the css.

0

This challenge is unreasonable. Someone please try implementing the backend of this challenge in PHP. Then he will realize that the challenge is far-fetched.

1

True. If I knew how does the backend look, I wouldn't use tutorials. I still have no idea what ls means

0

Ok, I've got the injection thing going solid, but I have no idea where to even start to look for the flag, I really need a hint Edit: Nevermind, I forgot basic things to do on a machine

0