samberry.dev
guest@samberry.dev:/writeup# cat Writeup:_Aarhus_CTF_2019_‑_Navitas_(Web)

Writeup: Aarhus CTF 2019 - Navitas (Web)

For the first time ever, the Department of Computer Science at Aarhus University hosted a Capture the Flag competition, where contestants participated in 24 hours of trying to break Cyber Security.

Challenge: Navitas (Aarhus CTF 2019)

By Team "! leftovers" (Sam Beresford & Emilie Bjerg)


Challenge description:

In this challenge we had to find the username of the linux system user.

ChallengeDescription

Solution:

The page does not contain any input fields, and the cookies does not seem give anything away, however, there is a page-query in the url. A directory traversal attack might therefore be possible using this. Changing home.php to ../../../../../etc/passwd makes us able to view the passwd file on the webservers linux system:

Solution

In this the flag is found: CTF{I_sh0Uld_n07_t4k3_P4thS_fR0M_t3H_U53R}

Full url (http://165.22.90.215:8094/?page=../../../../../etc/passwd)

Challenge solved!