Rating:
# Inside-Out
# Vulnerability
So, first of all, i was just playing around to find interesting about challenge. And i found two interesting.
the first one is (/admin) part. when I go to it, it was Forbidden by saying that "Only accessible from the local network".
The second thing that i found is (proxy-service). This proxy will show all the info and response about website that we want to get. Cool!
We can see there is a 'request' parameter that we can change the url which we want to go.
So, i am sured that this is SSRF vulnerability. Let pwn this!
# Solution
So i tested by (http://localhost/admin). but it was blacklist.
So i find the resources to bypass it, and i found blog post form HackTricks. (https://book.hacktricks.xyz/pentesting-web/ssrf-server-side-request-forgery)
So i found (http://0.0.0.0/admin) to bypass this blacklist. So i used it and got flag.
# flag
DUCTF{very_spooky_request}