Skip to content

Kaligo/hello-anya

 
 

Repository files navigation

Capture The Flag (CTF) Exercise

Welcome to the Capture The Flag (CTF) exercise! In this challenge, you will be tasked with exploiting a cloud-hosted website to uncover a secret key.

Challenge Overview

Your mission is to interact and try to exploit a cloud-hosted website to uncover a secret key hidden in a file within the website’s file system.

You are provided with the following resources:

  • A cloud-hosted website: https://hello-anya.fly.dev
  • The name of the text file that holds the secret key: "secret_file"
  • The source code of the above website (the actual "secret_file" is not included)
  • The first three letters of the secret: "19b"

Requirements

  • Go through the provided source code to understand how the website works and find any potential vulnerabilities.
  • Interact with the website while combining with the knowledge of the source code to uncover the hidden secret key
  • After successfully finding the secret key, you are required to submit your findings via email. Your submission should include:
    • The answer: the complete value of the secret key.
    • A short explanation of how you discovered the secret key.

Hint

  • Take a look at pages_controller.rb file, it's a great starting point!

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Ruby 67.4%
  • HTML 18.2%
  • CSS 6.5%
  • Dockerfile 4.4%
  • JavaScript 2.9%
  • Shell 0.6%