Contents

🌐 Includes

A detailed write-up of the Web challenge 'Includes' from PicoCTF - 2022

/images/PicoGym/PicoCTF-2022/Includes/challenge_presentation.png
Challenge Presentation

📊 Challenge Overview

Category Details Additional Info
🏆 Event PicoGym Event Link
🔰 Category Web 🌐
💎 Points Out of 500 total
⭐ Difficulty 🟢 Easy Personal Rating: 0/10
👤 Author LT ‘syreal’ Jones Profile
🎮 Solves 55.676 solve rate
📅 Date 30-01-2025 PicoGym
🦾 Solved By mH4ck3r0n3 Team:

📝 Challenge Information

Can you get the flag?

🎯 Challenge Files & Infrastructure

Provided Files

1
Files: None

🔍 Initial Analysis

First Steps

Initially, the website appears as follows:

/images/PicoGym/PicoCTF-2022/Includes/site_presentation.png
Site Presentation

Clicking the say hello button would open an alert that indicates the file containing the JavaScript script is not found on this page.

/images/PicoGym/PicoCTF-2022/Includes/say_hello.png
Alert

So, I decided to inspect the page source with CTRL + U:

/images/PicoGym/PicoCTF-2022/Includes/source.png
Page Source

As we can see here, two files are included: style.css and script.js. From the name of the challenge, the solution was quite intuitive. In fact, after trying to open the included files, I found the flag.

🎯 Solution Path

Exploitation Steps

Exploitation

The exploitation phase, being so simple, was explained directly in the section Initial Analysis.

Flag capture

/images/PicoGym/PicoCTF-2022/Includes/manual_flag.png
Manual Flag 1
/images/PicoGym/PicoCTF-2022/Includes/manual_flag2.png
Manual Flag 2

🛠️ Exploitation Process

Approach

The exploit makes two requests: one to /style.css and the other to script.js. Using a regex, I extracted the flag from the response and assembled it.

🚩 Flag Capture

Flag

Proof of Execution

/images/PicoGym/PicoCTF-2022/Includes/automated_flag.png
Automated Flag
Screenshot of successful exploitation

🔧 Tools Used

Tool Purpose
Python Exploit
ChromeDevTools Web Testing

💡 Key Learnings

Skills Improved

  • Binary Exploitation
  • Reverse Engineering
  • Web Exploitation
  • Cryptography
  • Forensics
  • OSINT
  • Miscellaneous

📊 Final Statistics

Metric Value Notes
Time to Solve 00:00 From start to flag
Global Ranking Challenge ranking
Points Earned Team contribution

Created: 30-01-2025 • Last Modified: 30-01-2025 *Author: mH4ck3r0n3 • Team: *