Evil-GPT

  1. Connected to the target via nc 10.201.98.229 1337.

  2. Got the following prompt after I connected.

  1. I started sending random messages to understand how the bot works.

Sometimes I just didn't understand the way the bot was processing my queries.

  1. I found an evilai.py file in the working directory but couldn't read it's contents, it probably had a role to play in the bot's functioning.

  2. I even found a .ollama file in the current working directory indicating that maybe the AI model was using ollama to run locally.

  3. Next I ran some commands to gain some information on the system.

  1. I tried to view the contents of the root directory which surprisingly I was able to do.

  1. Here I could see the flag.txt file sitting in all it's glory. I tried viewing it using basic prompt injection.

  1. The flag was found! It was that easy.

Last updated