A web exploitation CTF challenge focused on insecure file upload leading to RCE and privilege escalation.
The Abandoned Gate is a deliberately vulnerable web application designed for CTF practice.
It simulates a real-world scenario where:
- A file upload feature is misconfigured
- Remote code execution is possible
- Privilege escalation leads to full system compromise
- 🔍 Locate the hidden file upload functionality (Abandoned Gate)
- 📤 Upload a malicious PHP payload
- 💣 Trigger Remote Code Execution (RCE) and obtain a reverse shell
- ⬆️ Escalate privileges to root access
- Docker installed
👉 https://docs.docker.com/get-started/get-docker/
git clone https://github.com/PkTheHacker10/ctf-dev.git
cd ctf-devcd challenge
sudo ./setup.shcd challenge/web
sudo docker build -t abandoned-gate .
sudo docker run -d --name ctf-gate abandoned-gateFind container IP:
sudo docker exec ctf-gate ifconfigThen open in browser:
http://container-ip
sudo docker stop ctf-gate
sudo docker rm ctf-gateA full solution guide is available in:
WALKTHROUGH.md
This project is for educational and ethical hacking practice only.
Do not deploy in production or attack unauthorized systems.