Introduction#
Hey everyone 👋 — In this Capture The Flag (CTF) challenge, we’re given a description that someone, ctf player, has left sensitive data in a web portal using the email address, ctf-player@picoctf.org, to login. Let’s investigate! 🔎

Web Page#
We’re brought to a login page where it seems like we have to enter an email and a password. Lets look at the source code.

Source Code#

That’s interesting! — Looking at the source code we could see something hidden:
<!-- ABGR: Wnpx - grzcbenel olcnff: hfr urnqre "K-Qri-Npprff: lrf" -->
<!-- Remove before pushing to production! --> Decoding#
Hmm.. it seems like a ROT 13 algorithm. Lets use CyberChef to decode it.

We could see some text!
Jack - temporary bypass: use header "X-Dev-Access: yes"Requests#
We could use the developer console that you can enable using, ctrl+shift+i.

We utilize Reqbin to send HTTP requests.
Enter:
{"email":"ctf-player@picoctf.org","password":"sssssss"}As the JSON payload and http://amiable-citadel.picoctf.net:57281/login as the URL. For the headers, we’ll add X-Dev-Access as the key and yes as the value. We would be using a POST request. As an example, you can view it here

Flag 🚩#
We got a response!
{"success":true,"email":"ctf-player@picoctf.org","firstName":"pico","lastName":"player","flag":"picoCTF{brut4_f0rc4_125f752d}"}picoCTF{brut4_f0rc4_125f752d}

