Shell
Nmap
For sekaiCTF's scanner_service challenge, the webpage passes your ip_address:port input to
-iL, but it errored out and sent it to stderr instead)
~~^someone solved it with
iLthough, I just don't remember how~~
0.0.0.0:1337\t-iL\t/flag-????????????????????????????????.txt\t-oN\t/dev/stdoutfrom https://discord.com/channels/1004529434092654663/1093762384012771391/1145794495334580234
Anyway, if you add stuff after the port, you can add cli arguments:
ex: 127.0.0.1:80 --abcd would be
document.getElementById("yee").value = "127.0.0.1:80 --script http-favicon --script-args-file /flag.txt -dddddd".replaceAll(" ", "\t")
requests in python and make the post request yourself, but adding an id to the html element and pasting that into inspector works too
In this case, the flag file wasn't just flag.txt(I don't remember what it was) but it gave you the source for how it generated the filename, so you could just do flag-???.txt instead for however long the filename would be
I don't think it matters what script you put as long as it takes arguments
Also, you can repeat -v or -d to add more verbose/debug info
The output looked something like this: