Boot2Root Medium 1200 pts

Boot2Root

TechVenture Corp recently deployed a new infrastructure environment for internal operations and customer management. Due to rushed development and insecure deployment practices, multiple vulnerabilities were introduced across the stack.

1
Web Application Breach
The company recently launched an internal shopping platform called HackCTF Shop. Developers failed to properly sanitize user input inside the authentication system. Investigate the web application and determine whether authentication can be bypassed.
Q1. Capture the first flag. flag +199 pts
Try testing the login form for SQL Injection vulnerabilities.
2
Database Secrets
After bypassing authentication, internal product data becomes accessible. Some developers accidentally exposed sensitive operational information inside the database. Enumerate the application carefully and discover hidden credentials.
Q1. Capture the second flag. flag +300 pts
Inspect product descriptions and hidden database fields carefully.
3
Lateral Movement
Using credentials recovered from the database, pivot into the internal system through SSH access. Enumerate users, directories, and sensitive files to continue escalating access.
Q1. Capture the user flag. flag +300 pts
Weak password hygiene often enables lateral movement.
4
SUID Exploitation
During system enumeration, a suspicious SUID binary was discovered running with elevated privileges. Analyze the binary carefully and determine whether arbitrary command execution is possible.
Q1. Capture the privilege escalation flag. flag +300 pts
find / -perm -4000 -type f 2>/dev/null
Submit Flag