ctf-writeup/2023/DeconstruCT.F 2023/debugzero
daffainfo e6c48e50f1 feat: grouped the challs 2024-01-09 16:59:32 +07:00
..
images feat: grouped the challs 2024-01-09 16:59:32 +07:00
README.md feat: grouped the challs 2024-01-09 16:59:32 +07:00

README.md

debugzero

Someone on the dev team fat fingered their keyboard, and deployed the wrong app to production. Try and find what went wrong. The flag is in a file called "flag.txt"

About the Challenge

We got a very simple website (And also there is no source code for this chall)

preview

How to Solve?

First, let's analyze the homepage.

source_code

There is a HTML comment, that caught my interest

<!-- John, please don't run the app in debug mode, how many times do I have to tell you this! -->

This website was running in debug mode, but we still didn't know about the technology behind it. Then, I decided to try some of the common endpoints, such as /robots.txt, sitemap.xml, /console, /admin, etc. And voilà, there was an endpoint called /console

console

But we need to know the PIN code first to use the Werkzeug console. Now, let's get back to the homepage again. You will see there is a CSS file.

pin

934123? Is that a PIN code? As it turned out to be true, that number is the PIN code! Now, we need to open flag.txt to obtain the flag. In this case im gonna use open()

flag

dsc{p1zz4_15_4w350m3}