NISRA - different places
tags: NISRA
CTF
Web
Challenge: different places
Exploit - Integrate Fragments Flags
-
View Page Sources
-
base64 decode
dXNlcm5hbWU6YWRtaW5fcGFzc3dvcmQ6bmlzcmE=
$\to$username:admin_password:nisra
-
Observe the form It uses get method to fetch the parameters. So we can peek
login.php
first.Then we could use the username and password we got at previous step. Payload:
view-source:http://chall2.nisra.net:41025/login.php?username=admin&password=nisra
Then we got the last fragment flag.:::spoiler Whole flag
NISRA{KaN_y0u_fIND_FlA9_a7_dIff3R3n7_5Pac32}
:::