Task 4. Payload
- On the main page there is a button, when you click on it you get information about the system.
- Fuzzing the parameter btn did not give us anything. That’s sad, but is not the reason to give up!
- Find robots.txt file. We see there source code index.php
- In the source code we see that the script takes value from the GET parameter and executes it through the command system.
- Let's take advantage of the found vulnerability and print the source code of the script index.php - cat index.php.
Flag: VishwaCTF{y0u_f-o-u-n-d_M3}.