Web - pay2win
Easy | 247 solves | 50 points
Last updated
Easy | 247 solves | 50 points
Last updated
Kyle started an online magazine (The Daily Kyle) and published one of my articles on his site. Don't worry, the article literally contains the flag in plaintext, but if you want to read it you'll have to figure out how to bypass the paywall.
When we first visit the website, we are presented with a pop-up which is similar to your typical annoying advert.
After clicking No thanks
to clear the pop-up, we try to scroll down the page but scrolling has been disabled.
The first step is of course to open the browser's developer tools to find out what is going on but developer tools was blocked too.
Upon launching developer tools, the page will automatically redirect to a YouTube Rick-Roll video.
We can however, view the page source and a particular line stood out.
It appears that the flag is dynamically written by the page's JavaScript and we can access it through the URL.
At this point, I immediately suspected I could copy the website and execute it locally. But before I launch the page locally, I simplified the JavaScript to only contain the script responsible for loading the flag.
Initially, I tried to compute the plaintext flag just from the JavaScript itself but I could only get shwl_l1_twcd14}1ry4ht3neck_t3_bs{1c_hkh_tsh3he03gy_3l_hu
as the flag. Something else was missing. Hence, I also downloaded the main.css
from the page itself and added it to the local copy. I also removed any unnecessary html code to make the page as simple as possible.
Note that it is important to remove the flag-overlay
element otherwise the flag will be covered by the overlay. So, launching the cloned webpage locally now:
Flag: buckeye{h0ly_sh1t_wh4t_th3_h3ck_1s_th1s_w31rd_ch4ll3ng3}