๋ฐ์ํ Round#41 [Dreamhack] CTF Season 5 Round #4 - BypassIF ๐๏ธ Access Admin์ KEY๊ฐ ํ์ํฉ๋๋ค! ์๋ง์ KEY๊ฐ์ ์ ๋ ฅํ์ฌ ํ๋๊ทธ๋ฅผ ํ๋ํ์ธ์. ํ๋๊ทธ ํ์์ DH{...} ์ ๋๋ค. ๐พ Exploit Algorithm & Payload > ./app.py ๋๋ณด๊ธฐ #!/usr/bin/env python3 import subprocess from flask import Flask, request, render_template, redirect, url_for import string import os import hashlib app = Flask(__name__) try: FLAG = open("./flag.txt", "r").read() except: FLAG = "[**FLAG**]" KEY = hashlib.md5(FLAG.encode()).h.. 2024. 2. 25. ์ด์ 1 ๋ค์ ๋ฐ์ํ