mirror of
https://github.com/tmoron/darkly.git
synced 2025-09-27 12:48:35 +02:00
+ | Flag and decode
This commit is contained in:
18
flags/hidden_robot/README.md
Normal file
18
flags/hidden_robot/README.md
Normal file
@ -0,0 +1,18 @@
|
||||
# Finding the Hidden Flag
|
||||
|
||||
This is a quick rundown of our school project where we hacked a website (in a controlled lab environment) to find a hidden flag.
|
||||
|
||||
## What We Did
|
||||
|
||||
- **Starting Point:**
|
||||
We began at the `.hidden` directory, which was kept out of search engines by the `robots.txt` file.
|
||||
|
||||
- **How It Worked:**
|
||||
We built a script that went through each subdirectory looking for a README file. It checked the last byte of the file to spot any unusual values. If the byte didn't match the normal pattern, we knew we had found the flag.
|
||||
|
||||
- **Speeding Things Up:**
|
||||
We used multi-threading so that multiple pages could be checked at once, which made the process much faster.
|
||||
|
||||
## Takeaway
|
||||
|
||||
This project taught us how to combine directory traversal with threading and basic HTML parsing to uncover hidden information. Check out the repo for the full code!
|
1
flags/hidden_robot/flag
Normal file
1
flags/hidden_robot/flag
Normal file
@ -0,0 +1 @@
|
||||
d5eec3ec36cf80dce44a896f961c1831a05526ec215693c8f2c39543497d4466
|
@ -36,7 +36,7 @@ class Request(threading.Thread):
|
||||
print("\n\nFound the flag on: ", IP + BASE_URL + self.url)
|
||||
|
||||
flag = requests.get(IP + BASE_URL + self.url + "README")
|
||||
print(flag.content, "\n")
|
||||
print(flag.content.decode(), "\n")
|
||||
|
||||
exit(0)
|
||||
|
||||
|
Reference in New Issue
Block a user