webProeasy
Приключение с флагом (Flag Adventure)
hackerlab
Task: Find 4 hidden parts of the flag in a web application. Solution: Web reconnaissance - checking HTML comments, JavaScript files, CSS files, and robots.txt to collect all flag parts.
$ ls tags/ techniques/
source_code_analysishidden_dataweb_reconnaissancehtml_commentsjavascript_commentscss_commentsrobots_txtmulti_part_flag
HTML source code inspectionJavaScript file analysisCSS file analysisStandard file enumeration (robots.txt)
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Прятки (Hide and Seek)— hackerlab
- [web][Pro]Web-полигон (Web Polygon)— duckerz
- [misc][Pro]Исходный код (Source Code)— hackerlab
- [forensics][Pro]Скрытый след (Hidden Trail)— hackerlab
- [web][Pro]Секрет (Secret)— hackerlab