Hey all, figured I could start this discussion and ask for some guidance.
I can’t seem to figure out where to go, I’ve uncovered some neat things but all the data that I can see have nothing of use?
What am I overlooking? Any help would be greatly appreciated.
EDIT: Welp… after I posted I was able to find the flag… Whether or not I did it the correct way, who knows ■■■■
No need to crack any hashes or brute-force any creds/logins. As usual, or at least in my limited HtB experience that’s not really how things are set up to be. There’s usually a #facepalm way to the goal.
Managed to get flag only after restart challenge on another instance(port) and fired up “tool” again versus another instance.
Dunno what happened exactly…
My hint would be that the initial thing you have to find in the code is easier to spot in view-source:// and not in developer menu. The source served me an easy to read oneliner
Thanks. I’ve managed to solve it in the end.
It’s very fun and good challenge. @rheaalleen hints were also very helpful.
Read source + enumerate + exploit + the tool that you are using can do much more fun staff
Run exploit again with your enumeration findings and you’ll have the flag.
@syserror I didnt use anything special and havent updated in a while. I ran dirb with standard wordlist (meaning only url as parameter). If you want to be safe