Contents

🌐 Flag Fetcher

A detailed write-up of the Web challenge 'Flag Fetcher' from ACECTF1.0 - 2025

/images/ACECTF1.0-2025/Flag-Fetcher/challenge_presentation.png
Challenge Presentation

📊 Challenge Overview

Category Details Additional Info
🏆 Event ACECTF - 2025 Event Link
🔰 Category Web 🌐
💎 Points 200 Out of 500 total
⭐ Difficulty 🟢 Easy Personal Rating: 1/10
👤 Author Unknown Profile
🎮 Solves (At the time of writeup writing) 129 solve rate
📅 Date 27-02-2025 ACECTF - 2025
🦾 Solved By mH4ck3r0n3 Team: QnQSec

📝 Challenge Information

Hey guys, I created a flag fetcher using some web stacks & technologies. It was supposed to fetch the flag.webp image file which contains the flag but there was some kind of error in doing that. Can you verify it? Maybe just get the flag I don’t really care if you fix it or not. This should’ve worked

🎯 Challenge Files & Infrastructure

Provided Files

1
Files: None

🔍 Initial Analysis

First Steps

Initially, the website appears as follows:

/images/ACECTF1.0-2025/Flag-Fetcher/site_presentation.png
Site Presentation

After a while of Loading..., the file http://34.131.133.224/flag.webp is loaded.

/images/ACECTF1.0-2025/Flag-Fetcher/image.png
flag.webp

Let’s move on to the exploitation.

🎯 Solution Path

Exploitation Steps

Initial setup

Using WebDevTools, I noticed that the js included in the page makes fetch requests, gradually forming the flag with each fetch.

/images/ACECTF1.0-2025/Flag-Fetcher/fetch.png
Fetch

And from here, it’s already possible to manually extract the flag.

Exploitation

Looking at the console:

/images/ACECTF1.0-2025/Flag-Fetcher/console.png
Console

I found the lines of code where the fetch routes were contained, from which I was able to extract and manually assemble the flag.

Flag capture

/images/ACECTF1.0-2025/Flag-Fetcher/manual_flag.png
Manual Flag

🛠️ Exploitation Process

Approach

The automatic exploit makes a GET request to index--6xk1IdU.js, extracts the text, and uses a regex to extract the flag and print it.

🚩 Flag Capture

Flag

Proof of Execution

/images/ACECTF1.0-2025/Flag-Fetcher/automated_flag.png
Automated Flag
Screenshot of successful exploitation

🔧 Tools Used

Tool Purpose
Python Exploit
WebDevTools Web Testing

💡 Key Learnings

Skills Improved

  • Binary Exploitation
  • Reverse Engineering
  • Web Exploitation
  • Cryptography
  • Forensics
  • OSINT
  • Miscellaneous

📊 Final Statistics

Metric Value Notes
Time to Solve 00:01 From start to flag
Global Ranking (At the time of writeup writing) 1/581 Challenge ranking
Points Earned 200 Team contribution

Created: 27-02-2025 • Last Modified: 27-02-2025 Author: mH4ck3r0n3 • Team: QnQSec