Scavenger Hunt
Point: 50
Category
Web Exploitation
Question
There is some interesting information hidden around this site http://mercury.picoctf.net:27278/. Can you find it?
Hint
You should have enough hints to find the files, don't run a brute forcer.
Solution
After looking to the website, I opened the source code, It's led me to first part of the flag
<body>
<div class="container">
<header>
<h1>Just some boring HTML</h1>
</header>
<button
class="tablink"
onclick="openTab('tabintro', this, '#222')"
id="defaultOpen"
>
How
</button>
<button class="tablink" onclick="openTab('tababout', this, '#222')">
What
</button>
<div id="tabintro" class="tabcontent">
<h3>How</h3>
<p>How do you like my website?</p>
</div>
<div id="tababout" class="tabcontent">
<h3>What</h3>
<p>
I used these to make this site: <br />
HTML <br />
CSS <br />
JS (JavaScript)
</p>
<!-- Here's the first part of the flag: picoCTF{t -->
</div>
</div>
</body>Next, I looked to css and js file. From css file I got second part of the flag
And in the js file, I got a hint. Okay, just googling the question, then it was help me know about robots.txt file. Thus, I tried to go to target/robots.txt -> got part 3 of the flag
From the hint, It was uppercase Access word and it's apache server. Hmm, I was tried to access .htaccess file -> got part 4 of the flag. If you do not know about .htaccess file, basically it's a powerful website file that controls high-level configuration of your website. On servers that run Apache (a web server software), it allows you to changes to your website's configuration without having to edit server configuration
It's again with Store uppercase word, so I tried access to .DS_Store file -> I got final part of the flag.
Flag
picoCTF{th4ts_4_l0t_0f_pl4c3s_2_lO0k_a69684fd}
Last updated