Try to uncover this password to get the first flag!
Password:View Page Source & try editing a "password"
Right click + inspect element on the password field. change type="password" to type="text"
And never use Autofill on shared computers
Try to find the creds for this JS ROUTER login!
Google is your friend for finding device DOCUMENTATION
How is JS LINKED to a webpage?
There is a hidden .txt file on this site that contains the flag.
For this challenge, you will need a script that searches through url subdomains and subdirectories.
Alternatively, if you've done CTFs before, try looking for some common .txt files.
Recommended and common tools for this challenge are Dirbuster, Dirb, and Gobuster. They can use wordlists to query url subdomains.
For those of you who are new to CTFs, 'robots.txt' is a common file on many CTF boxes.
The flag is in the picture!
Save the picture, install Stegosuite (linked), run it, and open the picture in Stegosuite. Then click extract.
39655fb7cccf3e04933f77508f5d1487
68e109f0f40ca72a15e05cc22786f8e6
467b7d12a5ecc3aaebdfed6d70ab7c51
Below are some incredible cyber threat intelligence sources, so that you can stay abreast on the latest threats:
Lastly, here are some amazing threat intelligence tools that you can access straight from your web browser:
VirusTotal is a free signature-based virus, malware, and URL scanning service that queries malicious Indicators of Compromise (IOCs) across multiple databases.
RiskIQ's PassiveTotal is a threat investigation platform that consolidates massive sets of diverse internet data sources into a single platform.
Shodan is a powerful search engine that queries for Internet-connected devices around the world.