🌐 Flag Fetcher
A detailed write-up of the Web challenge 'Flag Fetcher' from ACECTF1.0 - 2025
📊 Challenge Overview
Category Details Additional Info 🏆 Event ACECTF - 2025 Event Link 🔰 Category Web 🌐 💎 Points 200 Out of 500 total ⭐ Difficulty 🟢 Easy Personal Rating: 1/10 👤 Author Unknown Profile 🎮 Solves (At the time of writeup writing) 129 solve rate 📅 Date 27-02-2025 ACECTF - 2025 🦾 Solved By mH4ck3r0n3 Team: QnQSec
📝 Challenge Information
Hey guys, I created a flag fetcher using some web stacks & technologies. It was supposed to fetch the flag.webp image file which contains the flag but there was some kind of error in doing that. Can you verify it? Maybe just get the flag I don’t really care if you fix it or not. This should’ve worked
🎯 Challenge Files & Infrastructure
Provided Files
1
Files: None
🔍 Initial Analysis
First Steps
Initially, the website appears as follows:
After a while of
Loading...
, the filehttp://34.131.133.224/flag.webp
is loaded.Let’s move on to the exploitation.
🎯 Solution Path
Exploitation Steps
Initial setup
Using
WebDevTools
, I noticed that thejs
included in the page makes fetch requests, gradually forming the flag with each fetch.And from here, it’s already possible to manually extract the flag.
Exploitation
Looking at the console:
I found the lines of code where the fetch routes were contained, from which I was able to extract and manually assemble the flag.
Flag capture
🛠️ Exploitation Process
Approach
The automatic exploit makes a GET request to
index--6xk1IdU.js
, extracts the text, and uses a regex to extract the flag and print it.
🚩 Flag Capture
Flag
Proof of Execution
🔧 Tools Used
Tool Purpose Python Exploit WebDevTools Web Testing
💡 Key Learnings
Skills Improved
- Binary Exploitation
- Reverse Engineering
- Web Exploitation
- Cryptography
- Forensics
- OSINT
- Miscellaneous
📊 Final Statistics
Metric | Value | Notes |
---|---|---|
Time to Solve | 00:01 | From start to flag |
Global Ranking (At the time of writeup writing) | 1/581 | Challenge ranking |
Points Earned | 200 | Team contribution |
Created: 27-02-2025 • Last Modified: 27-02-2025 Author: mH4ck3r0n3 • Team: QnQSec