Web Exploitation (File Upload → RCE → Privilege Escalation)
Medium
This challenge focuses on identifying and exploiting a file upload vulnerability that leads to Remote Code Execution (RCE) and privilege escalation. The application includes an insecure file upload mechanism that can be abused to gain unauthorized access to the system. Participants must locate the vulnerable upload point, exploit it to obtain a shell, and escalate their privileges to gain full control over the system.
- Find the Abandoned Gate[file upload functionality]
- upload the exploit [php] .
- Trigger the exploit to Take a Reverse Shell – Exploit the vulnerability to gain a remote shell.
- Escalate Privileges to root – Gain root access through privilege escalation.
- Docker
Ensure you have Docker installed on your system. You can download it from Docker's official site.
- Clone this repo by
git clone https://github.com/PkTheHacker10/ctf-dev.git
Run the provided setup.sh script to automate the container build and execution:
cd ctf-dev/challenge
sudo ./setup.shFollow these steps to set up the challenge manually:
cd ctf-dev/challenge/web
sudo docker build -t my-ctf .
sudo docker run -d --name ctf-room my-ctf
You should find your docker ip to access the web to test this vulnerability you can get it by this command
sudo docker exec ctf-room ifconfig
Now you can be able to access it via " http://container-ip " from your host
sudo docker stop ctf-room
sudo docker rm ctf-room
You can read the walkthrough for challenge solution from WALKTHROUGH.md