Use your exploitation skills to bypass authentication mechanisms on a website and get RCE.
Write-up: Hammer


Use your exploitation skills to bypass authentication mechanisms on a website and get RCE.

The librarian rushed some final changes to the web application before heading off on holiday. In the process, they accidentally left sensitive information behind! Your challenge is to find and exploit the vulnerabilities in the application to extract these secrets.

Cipher’s legion of bots has exploited a known vulnerability in our web application, leaving behind a dangerous web shell implant. Investigate the breach and trace the attacker’s footsteps!