Captcha: Me If You Can Root Me

🎯 Never trust user input, even behind a CAPTCHA.

#RootMe #CTF #CyberSecurity #Captcha #PrivEsc Captcha Me If You Can – Root Me Walkthrough Challenge type: App – System Goal: Bypass CAPTCHA, escalate to root. 1. Initial recon The web app asks you to solve a math-based CAPTCHA before showing a command execution form. CAPTCHA image is generated server-side but easily predictable. 2. Automate CAPTCHA solving Used pytesseract + PIL: captcha me if you can root me

CAPTCHA without rate-limiting + hidden command injection = game over. 🎯 Never trust user input, even behind a CAPTCHA

Title: Captcha Me If You Can – Root Me Write-up 🧩💀 Initial recon The web app asks you to

import os os.system("cat /root/flag.txt") ✅ RM{...} captured.

1️⃣ CAPTCHA extraction via OCR (tesseract/pytesseract) 2️⃣ Session reuse with cookies 3️⃣ Command injection in solve parameter 4️⃣ sudo -l → python3 root flag