Rating: 2.0

#try(web, 150, 67 solves)
> "I never try anything, I just do it!" Do

> Flag is in /challenge/flag

![scr1](scr1.png)

We are able to execute haskell scripts that are stored on the server, we are also able to upload a profile gif.

Our challenge is to read `/challenge/flag`

We should be able to upload a script that is also a valid gif and then execute it using a path traversal.

File that meets both cryteria:

![scr2](scr2.png)

```
Run!
Output
"33C3_n3xt_T1me_idri5_m4ybe\n"
```

Original writeup (https://github.com/p4-team/ctf/blob/master/2016-12-27-33c3/web_150_try/README.md).
norajDec. 30, 2016, 10:32 a.m.

don't publish a writup if there is nothing inside