@LiveOverflow
  @LiveOverflow
LiveOverflow | Exploiting Java Tomcat With a Crazy JSP Web Shell - Real World CTF 2022 @LiveOverflow | Uploaded 2 years ago | Updated 4 hours ago
This was a hard web CTF challenge involving a JSP file upload with very restricted character sets. We had to use the Expression Language (EL) to construct useful primitives and upload an ascii-only .jar file.

Alternative writeups: github.com/voidfyoo/rwctf-4th-desperate-cat/tree/main/writeup
Fuzzing log4j with Jazzer: youtube.com/watch?v=kvREvOvSWt4

-=[ ❤️ Support ]=-

→ per Video: patreon.com/join/liveoverflow
→ per Month: youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ 🐕 Social ]=-

→ Twitter: twitter.com/LiveOverflow
→ Instagram: instagram.com/LiveOverflow
→ Blog: liveoverflow.com
→ Subreddit: reddit.com/r/LiveOverflow
→ Facebook: facebook.com/LiveOverflow
Exploiting Java Tomcat With a Crazy JSP Web Shell - Real World CTF 2022Public Penetration Test Reports - Learning ResourceMinecraft Reach HackKernel Root Exploit via a ptrace() and execve() Race ConditionExploit Fails? Debug Your Shellcode - bin 0x2BDeepdive Containers - Kernel Sources and nsenterPentesting vs. Bug Bounty vs. Pentesting ???Solving Nintendo HireMe!!! with Basic MathDeveloping GDB Extension for Heap Exploitation | Ep. 12Hacking Google Cloud?Arbitrary Read and Write in WebKit ExploitWhy Pick sudo as Research Target? | Ep. 01

Exploiting Java Tomcat With a Crazy JSP Web Shell - Real World CTF 2022 @LiveOverflow

SHARE TO X SHARE TO REDDIT SHARE TO FACEBOOK WALLPAPER