WM01 - 250pts
Briefing
View the page at https://cfta-wm01.allyourbases.co and try to get the flag.
Solution
When looking around for interesting files we can find an interesting comment in
/assets/js/site.jsthat says// Image slideshow. Moved in from /new-images when each is finalised.Navigating to
/new-imagesshows a list of pictures. Checking each picture to see if the flag is hidden using steganography tricks yields nothing.It took a lot of different ideas but eventually I tried using Google's reverse image search to see if any of the images in
/new-imageswere unique. The image of the macbook with the screen showing "mii-home" got some matches, but none of them had the "mii-home" graphic. Going to/mii-homeshows a login page.The username and password for the login page at
/mii-homeare validated usinglogin.js. We can deobfuscate it with de4js to get the output in login.js. We can run lines 1-18 in the JS console (only if not already on/mii-home) and then define j to hl_b withj = hl_b. Finally, simply run line 28:window[j(0x73)] = 'se' + 'curi' + 'ty-' + 'ca' + j(0x7d) + '/f' + j(0x70);. This will redirect to/mii-home/security-camera/feed/.We can look at the "Office" camera to see a note that says the WiFi password is
XGHEV7HGEV, which is the flag.
Flag
XGHEV7HGEV
Last updated
Was this helpful?