- Kishor Balan tipped us off that the following code may need inspection: http://jupiter.challenges.picoctf.org:9670
- Author: zaratec/danny
- Tags : picoCTF2021 , WebExploit
- Source: URL1 URL2
Title is inspector , So i think inspect all pages and source of this website. Source attached from picoCTF
Step - 1 :
- Visiting the website, we right click and choose to view source code, getting the first third of the flag, included as a html comment:
Result
- When i got the 1st part of flag in the 31 th line on Source Page
<!-- Html is neat. Anyways have 1/3 of the flag: picoCTF{tru3_d3 -->
Step - 2 :
- Then Inspect the site
Ctrl + Shift + I
and Click on the style editor - I got the Second pard of flag in 51 line on mycss.css
Step - 3 :
- Then i try to access the js file like https://jupiter.challenges.picoctf.org/problem/9670/ + myjs.js
- Finall part are also catched .