# web flask SSTI  
![image](https://user-
images.githubusercontent.com/65381453/131301407-7d751004-0975-43cb-a11a-b69bbe120ab6.png)

# recon  
![image](https://user-
images.githubusercontent.com/65381453/131301965-22beafdc-2ec2-440c-ac01-0c186ad89e59.png)

the function of this site is base64 decode the inserted value to the actual
value

nothing else and i think it's SSTI  
# quất  
![image](https://user-
images.githubusercontent.com/65381453/131304776-ffb1a317-2085-4ea7-a957-b7021084df31.png)

and decode

![image](https://user-
images.githubusercontent.com/65381453/131304826-38a65ced-019a-471d-9dba-a42eab6f519a.png)

oke ! next i find payload in here

![image](https://user-
images.githubusercontent.com/65381453/131305107-5e72af28-2d46-4db6-b41e-6c7c4293d6b9.png)

and result :

![image](https://user-
images.githubusercontent.com/65381453/131305648-4b86a676-9e2c-4446-95dd-3f8770a67fe2.png)

# FIND Flag

```  
Note: Flag is located in etc directory  
```  
## LS /etc  
![image](https://user-
images.githubusercontent.com/65381453/131305803-1dd39ce3-2fdd-477f-a46f-ca83dddbd305.png)

result: found flag.txt

![image](https://user-
images.githubusercontent.com/65381453/131305863-fa2c6ebb-7eb6-4064-8af2-e2d5baca0e9a.png)

## cat flag.txt  
![image](https://user-
images.githubusercontent.com/65381453/131306272-6b332ff7-bd0f-485c-95c5-8e110ba590e3.png)

result:

![image](https://user-
images.githubusercontent.com/65381453/131306302-6a66ba68-d812-4fa2-8e81-cd541f897c15.png)

Congratulation for my team AUZ1 , we are new team without exp

Original writeup
(https://github.com/anhchangmutrang/CTF/blob/main/Wormcon-24hCTF-2021/Secret%20Provider.md).