+ | Flag and decode

This commit is contained in:
RedShip
2025-04-03 16:18:01 +02:00
parent f1344f9653
commit 1507d5924b
3 changed files with 20 additions and 1 deletions

View File

@ -0,0 +1,18 @@
# Finding the Hidden Flag
This is a quick rundown of our school project where we hacked a website (in a controlled lab environment) to find a hidden flag.
## What We Did
- **Starting Point:**
We began at the `.hidden` directory, which was kept out of search engines by the `robots.txt` file.
- **How It Worked:**
We built a script that went through each subdirectory looking for a README file. It checked the last byte of the file to spot any unusual values. If the byte didn't match the normal pattern, we knew we had found the flag.
- **Speeding Things Up:**
We used multi-threading so that multiple pages could be checked at once, which made the process much faster.
## Takeaway
This project taught us how to combine directory traversal with threading and basic HTML parsing to uncover hidden information. Check out the repo for the full code!

1
flags/hidden_robot/flag Normal file
View File

@ -0,0 +1 @@
d5eec3ec36cf80dce44a896f961c1831a05526ec215693c8f2c39543497d4466

View File

@ -36,7 +36,7 @@ class Request(threading.Thread):
print("\n\nFound the flag on: ", IP + BASE_URL + self.url)
flag = requests.get(IP + BASE_URL + self.url + "README")
print(flag.content, "\n")
print(flag.content.decode(), "\n")
exit(0)