Scavenger Hunt

Point: 50

Category

Web Exploitation

Question

There is some interesting information hidden around this site http://mercury.picoctf.net:27278/. Can you find it?

Hint

You should have enough hints to find the files, don't run a brute forcer.

Solution

After looking to the website, I opened the source code, It's led me to first part of the flag

<body>
  <div class="container">
    <header>
      <h1>Just some boring HTML</h1>
    </header>

    <button
      class="tablink"
      onclick="openTab('tabintro', this, '#222')"
      id="defaultOpen"
    >
      How
    </button>
    <button class="tablink" onclick="openTab('tababout', this, '#222')">
      What
    </button>

    <div id="tabintro" class="tabcontent">
      <h3>How</h3>
      <p>How do you like my website?</p>
    </div>

    <div id="tababout" class="tabcontent">
      <h3>What</h3>
      <p>
        I used these to make this site: <br />
        HTML <br />
        CSS <br />
        JS (JavaScript)
      </p>
      <!-- Here's the first part of the flag: picoCTF{t -->
    </div>
  </div>
</body>

Next, I looked to css and js file. From css file I got second part of the flag

/* CSS makes the page look nice, and yes, it also has part of the flag. Here's part 2: h4ts_4_l0 */

And in the js file, I got a hint. Okay, just googling the question, then it was help me know about robots.txt file. Thus, I tried to go to target/robots.txt -> got part 3 of the flag

/* How can I keep Google from indexing my website? */
User-agent: *
Disallow: /index.html
# Part 3: t_0f_pl4c
# I think this is an apache server... can you Access the next flag?

From the hint, It was uppercase Access word and it's apache server. Hmm, I was tried to access .htaccess file -> got part 4 of the flag. If you do not know about .htaccess file, basically it's a powerful website file that controls high-level configuration of your website. On servers that run Apache (a web server software), it allows you to changes to your website's configuration without having to edit server configuration

# Part 4: 3s_2_lO0k
# I love making websites on my Mac, I can Store a lot of information there.

It's again with Store uppercase word, so I tried access to .DS_Store file -> I got final part of the flag.

Congrats! You completed the scavenger hunt. Part 5: _a69684fd}

Flag

picoCTF{th4ts_4_l0t_0f_pl4c3s_2_lO0k_a69684fd}

Last updated