Skip to content

molii566/picoCTF-unminify-writeup

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

2 Commits
ย 
ย 
ย 
ย 

Repository files navigation

picoCTF โ€“ Unminify [Web Exploitation] Write-Up

๐Ÿง  Challenge Overview

Category: Web Exploitation
Challenge Description:

Welcome to my flag distribution website!
If you're reading this, your browser has successfully received the flag.
I just deliver flags, I don't know how to read them...


๐Ÿงฉ Step-by-Step Walkthrough

๐Ÿ”น Step 1: Launch the Challenge Instance

I began by launching the instance provided by the challenge. This gave me access to a hosted environment where the flag was supposedly being served.

๐Ÿ“ธ Screenshot (optional)
Launch Instance


๐Ÿ”น Step 2: Access the Challenge Webpage

I clicked on the โ€œClick hereโ€ link provided by the instance, which opened a new page displaying the following message:

Welcome to my flag distribution website!
If you're reading this, your browser has successfully received the flag.
I just deliver flags, I don't know how to read them...

๐Ÿ“ธ
Challenge Message


๐Ÿ”น Step 3: View the Page Source

Right-clicked the webpage โ†’ "View Page Source" (or used Ctrl+U) to inspect the HTML content.

๐Ÿ“ธ
View Source


๐Ÿ”น Step 4: Format the Minified Code

The source revealed a long minified JavaScript block. To make it readable, I enabled "Wrap long lines" in the browser source view. This, along with syntax highlighting, helped me analyze the script more effectively.

๐Ÿ“ธ
Wrapped Code


๐Ÿ”น Step 5: Analyze and Extract the Flag

After reading through the formatted HTML, I found the flag embedded in plain text: ๐Ÿ“ธ
formated Code

picoCTF{pr3tty_c0d3_622b2c88}

Conclusion

This challenge reinforces the importance of viewing and analyzing source code during CTFs.
 Even heavily minified or obfuscated scripts may contain valuable clues if you know where and how to look

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published