<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: 00xtrkh</title>
    <description>The latest articles on DEV Community by 00xtrkh (@00xtrkh).</description>
    <link>https://dev.to/00xtrkh</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2456353%2Ff194c437-981d-4303-8b56-48f6420ca6e3.png</url>
      <title>DEV Community: 00xtrkh</title>
      <link>https://dev.to/00xtrkh</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/00xtrkh"/>
    <language>en</language>
    <item>
      <title>How I Solved a Server-Side Template Injection Challenge (picoCTF Write-up)</title>
      <dc:creator>00xtrkh</dc:creator>
      <pubDate>Mon, 12 May 2025 01:24:47 +0000</pubDate>
      <link>https://dev.to/00xtrkh/how-i-solved-a-server-side-template-injection-challenge-picoctf-write-up-mb9</link>
      <guid>https://dev.to/00xtrkh/how-i-solved-a-server-side-template-injection-challenge-picoctf-write-up-mb9</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3rtgpk7k2cwp38xqw4n1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3rtgpk7k2cwp38xqw4n1.png" alt="Image description" width="800" height="450"&gt;&lt;/a&gt;Hey folks 👋&lt;/p&gt;

&lt;p&gt;I recently tackled a Server-Side Template Injection (SSTI) challenge from the &lt;a href="https://picoctf.org/" rel="noopener noreferrer"&gt;picoCTF&lt;/a&gt; and decided to create a write-up and a video to help others learn from it.&lt;/p&gt;

&lt;p&gt;This post is a beginner-friendly explanation of the process, covering:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;How to identify SSTI vulnerabilities&lt;/li&gt;
&lt;li&gt;Payload crafting&lt;/li&gt;
&lt;li&gt;Exploitation strategy&lt;/li&gt;
&lt;li&gt;Things I learned and tools I used&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🎥 Video Walkthrough
&lt;/h2&gt;

&lt;p&gt;📺 &lt;a href="https://www.youtube.com/@00xtrkh" rel="noopener noreferrer"&gt;Watch the video on YouTube&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  🧠 Full Write-up with Code and Notes
&lt;/h2&gt;

&lt;p&gt;📖 &lt;a href="https://github.com/00xtrkh/ctfs-writeups/blob/main/picoctf/2025/web/SSTI1.md" rel="noopener noreferrer"&gt;Check out the GitHub repository&lt;/a&gt;&lt;/p&gt;




&lt;p&gt;This is meant for beginners and students diving into web exploitation, bug bounty, and CTFs.&lt;/p&gt;

&lt;p&gt;Feel free to share feedback or ask questions in the comments!&lt;/p&gt;

&lt;h1&gt;
  
  
  cybersecurity #ctf #ssti #infosec #websecurity #writeup #bugbounty #picoctf
&lt;/h1&gt;

</description>
      <category>cybersecurity</category>
      <category>ctf</category>
      <category>python</category>
      <category>github</category>
    </item>
  </channel>
</rss>
