V2.fams.cc May 2026

At first glance the service looks harmless, but a closer look reveals three exploitable weaknesses that can be chained together:

# 2️⃣ Pull the encrypted blob curl -s "$DOWNLOAD" -o /tmp/enc.bin v2.fams.cc

Category: Web (with a touch of crypto) Points: 450 (CTF‑style) Difficulty: Medium – Hard Author’s note: This write‑up assumes the challenge was taken from a public CTF (the site is still reachable from the Internet). All commands are shown exactly as they were run, and the final flag is reproduced exactly as it appeared in the challenge (the flag format is FLAG… ). 1. Challenge Overview v2.fams.cc is a small web‑application that presents a “file‑sharing” interface. The landing page shows a form that asks for a URL and a key . The server then fetches the supplied URL, encrypts the content with a user‑supplied key, and returns the ciphertext together with a short “download” link. At first glance the service looks harmless, but

By abusing the SSRF to read the internal flag file, then using the deterministic encryption routine to decrypt it (the service returns the ciphertext and the key it used), we can recover the flag. 2.1. Basic browsing $ curl -s http://v2.fams.cc Result – a tiny HTML page: Challenge Overview v2