--- name: ctf-web description: Web exploitation techniques for CTF challenges. Use when solving web security challenges involving XSS, SQLi, CSRF, file upload bypasses, JWT attacks, Web3/blockchain exploits, or other web vulnerabilities. user-invocable: false --- # CTF Web Exploitation Quick reference for web CTF challenges. Each technique has a one-liner here; see supporting files for full details with payloads and code. ## Additional Resources - [server-side.md](server-side.md) - Server-side attacks: SQLi, SSTI, SSRF, XXE, command injection, code injection (Ruby/Perl/Python), ReDoS, file write→RCE, eval bypass - [client-side.md](client-side.md) - Client-side attacks: XSS, CSRF, CSPT, cache poisoning, DOM tricks, React input filling, hidden elements - [auth-and-access.md](auth-and-access.md) - Auth/authz attacks: JWT, session, password inference, weak validation, client-side gates, NoSQL auth bypass - [node-and-prototype.md](node-and-prototype.md) - Node.js: prototype pollution, VM sandbox escape, Happy-DOM chain, flatnest CVE - [web3.md](web3.md) - Blockchain/Web3: Solidity exploits, proxy patterns, ABI encoding tricks, Foundry tooling - [cves.md](cves.md) - CVE-specific exploits: Next.js middleware bypass, curl credential leak, Uvicorn CRLF, urllib scheme bypass --- ## Reconnaissance - View source for HTML comments, check JS/CSS files for internal APIs - Look for `.map` source map files - Check response headers for custom X- headers and auth hints - Common paths: `/robots.txt`, `/sitemap.xml`, `/.well-known/`, `/admin`, `/api`, `/debug`, `/.git/`, `/.env` - Search JS bundles: `grep -oE '"/api/[^"]+"'` for hidden endpoints - Check for client-side validation that can be bypassed - Compare what the UI sends vs. what the API accepts (read JS bundle for all fields) ## SQL Injection Quick Reference **Detection:** Send `'` — syntax error indicates SQLi ``` ' OR '1'='1 # Classic auth bypass ' OR 1=1-- # Comment termination username=\&password= OR 1=1-- # Backslash escape quote bypass ' UNION SELECT sql,2,3 FROM sqlite_master-- # SQLite schema 0x6d656f77 # Hex encoding for 'meow' (bypass quotes) ``` See [server-side.md](server-side.md) for second-order SQLi, LIKE brute-force, SQLi→SSTI chains. ## XSS Quick Reference ```html ``` Filter bypass: hex `\x3cscript\x3e`, entities `<script>`, case mixing `