Command Injection & Filter BYPASS Techniques EXPOSED | BrunnerCTF 2025
π Stay ahead of cybersecurity insights β Subscribe & turn on notifications! In this video, we explore two challenges from Brunner's Capture The Flag (CTF) 2025, focusing on command injection and local file inclusion (LFI) vulnerabilities. The first challenge involves testing a command injection vulnerability to retrieve system files. The second challenge involves finding a hidden flag within a web application, utilizing techniques such as examining robots.txt and PHP filters to bypass security measures. The CTF focuses on real-world web application security vulnerabilities and filters. Takeaways: β’ The challenge 'Baking Bad' focuses on command injection techniques. β’ Command injection can be tested by breaking out of specific commands. β’ Bypassing filters is crucial in command injection scenarios. β’ Linux environment variables can be exploited for command injection. β’ Using PHP wrappers can help in reading files as streams. β’ Robots.txt can reveal hidden directories in web applications. β’ LFI vulnerabilities can be tested by accessing system files. β’ Understanding the backend structure is key to exploiting vulnerabilities. β’ Enumeration is essential in both challenges to find flags. β’ Effective CTF strategies involve a mix of creativity and technical knowledge. Chapters: 00:00 Introduction to Brunner's CTF 2025 07:09 Exploring the Second Challenge π₯ What Makes You Different Podcast: https://www.youtube.com/playlist?list=PLdTw7mr-fqcjRlfC5u87y2kGI5PA-fhrC Follow us everywhere: π Website: https://mresecurity.com π LinkedIn: https://www.linkedin.com/company/mresecurity π Facebook: https://facebook.com/mresecure πΈ Instagram: https://instagram.com/mresecurity Republic of Hackers Discord: https://discord.gg/tyft6vM8bt Disclaimer: This video is for educational purposes only. It demonstrates ethical hacking techniques to improve cybersecurity, and MRE Security is not responsible for how viewers choose to use this information. #cybersecurity #penetrationtesters #networksecurity #vulnerabilities #certifications #infosec #pentesting #certifications #cyber #security
Download
0 formatsNo download links available.