NISRA - different places
tags: NISRA CTF Web
Challenge: different places
Exploit - Integrate Fragments Flags
-
View Page Sources

-
base64 decode
dXNlcm5hbWU6YWRtaW5fcGFzc3dvcmQ6bmlzcmE=$\to$username:admin_password:nisra -
Observe the form It uses get method to fetch the parameters. So we can peek
login.phpfirst.
Then we could use the username and password we got at previous step.
Payload: view-source:http://chall2.nisra.net:41025/login.php?username=admin&password=nisraThen we got the last fragment flag.:::spoiler Whole flag
NISRA{KaN_y0u_fIND_FlA9_a7_dIff3R3n7_5Pac32}:::