stealthcopter ctf primer1

Check Source Code

FLAG{check_the_comments_lol}
Flag 2
Just as before, I opened the source code. I see js file there.

Flag 3
View source code.
And I see code "Base64" Copy to the Cyber Chef.

FLAG{h4ck_t1m3}
Flag 4
Open the given php w.o4.php

I try run using online tools. http://www.writephponline.com/
But it did not display anything.
I try to delete // (Comment). Ta-Da!

FLAG{php_is_a_b4d_l4ngu4g3}

So, it is a brute force. So, I entered one by one number 1-9.
BINGO!

FLAG{n0t_s0_t0ugh}
FLAG 6
FLAG 7
FLAG 8
Open the JWT
eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpZCI6MTIzNCwidXNlcm5hbWUiOiJhZG1pbiIsInBhc3N3b3JkIjoiRkxBR3tqd3RfdDBrM25zX2FyM19jMDBsX2IzNG56fSJ9.gNVX4fCIMvjLYZ0jUY0untMYbPmRNNFzZwXyU01bv-M
Search for JWT, and fount this website.
https://www.jsonwebtoken.io/

FLAG{jwt_t0k3ns_ar3_c00l_b34nz}
FLAG 9
eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpZCI6MTMzNywidXNlcm5hbWUiOiJhZG1pbiIsImhpbnQiOiJ0aGUgZmxhZyBpcyBGTEFHe3h4eHh4eHhfZDFjdDEwbjRyeV80dHQ0Y2t9IHdoZXJlIHh4eHh4eHggaXMgdGhlIHBhc3N3b3JkIHVzZWQgdG8gc2lnbiB0aGlzIHRva2VuIn0.dWwXygXbxXud7WVBBVNwBZwUXjsxUhwMmN8rFnRyVgE
Use same tools as before.
https://www.jsonwebtoken.io/

FLAG{xxxxxxx_d1ct10n4ry_4tt4ck}
Hint: Password to sign this hash. So, we try Hashcat.
OUTPUT:

Rockyou
FLAG{rockyou_d1ct10n4ry_4tt4ck}
FLAG 10
Flag 1
FLAG{1st_time_lucky}
By AdaniKamal
Last updated