Advertisement
iAnonGuy

AnonGuy's Challenge [#15] - Solution

May 30th, 2015
367
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
HTML 1.47 KB | None | 0 0
  1. The challenge was to print the flag on the page http://prntscr.com/7b4d4h , so let's see what we can find O.o ~ http://prntscr.com/7b387y
  2. Nothing suspicious except this ~ http://prntscr.com/7b38kc
  3. Let's see what's there o.O ~ http://prntscr.com/7b3911 - k, fu.
  4. Ah, Humans <-> Robots :v ~ http://prntscr.com/7b3hbr
  5. @ /sysadmin ~ http://prntscr.com/7b3hlh
  6. :| Let's find the credentials ;_____;
  7. 3:) ~ http://prntscr.com/7b3nzl
  8. Looks Like Base64 http://prntscr.com/7b3ofo O.o - Let's try decoding it :D
  9. http://prntscr.com/7b3oq1 :|
  10. http://prntscr.com/7b3p4y ~ Equal Sign @ the start O.o
  11. Looks like it's reversed o.O ~ http://prntscr.com/7b3vov
  12. Let's base64 decode it now :D ~ http://prntscr.com/7b3wab :|
  13. Another Encryption? :| ~ Doesn't looks like no base64 this time O.o
  14. It ain't no sha/md5 hash lemme try rot13 ~ http://prntscr.com/7b3z88 #One of the common param encryptions after base64
  15. http://prntscr.com/7b3zwb ~ 3:)
  16. Now what? Where's the flag? O.o Oh yeah, the /sysadmin o.O maybe it's there ~ http://prntscr.com/7b45a6
  17. http://prntscr.com/7b45g9 ~ Great :D Let's open it
  18. http://prntscr.com/7b461e ~ Awesome, Let's login ^_^
  19. http://prntscr.com/7b46tw ~ Ta-Da !! 8|
  20. ps: after Mak Man and T3N38R15 Solved the challenge the challenge was made lil easier =)) by adding an is_array if statement thanks to t3n38ri5 ...
  21. pss: http://food4u.in/sol.php -> You can do the encryption/decryption here =))
  22. <!--
  23. <solvers>
  24.     <1>Mak Man</1>
  25.     <2>T3N38R15</2>
  26.     <3>Shariar Islam</3>
  27. </solvers>
  28. -->
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement