This is a simple CTF I made. The goal is to find the flag, which is hidden in the file flag.txt. The program runs a vulnerable web app. This CTF will test your skills in basic JS and XSS. No cheating and looking at the source code!
goddammit. Rickrolled
Also, yay, figured it out
@roylatgnail Wait, so the rickroll video was the flag? Oops. I accidentally deleted it because I thought the flag was actually something you could just copy and paste into the comments or something, not a rickroll video.
incredible idea! however, I couldn't solve it because I just shut down the repl xd but I figured out how to
@MrEconomical oof, i should probably add a try-catch or something
@MrEconomical now you can't do that anymore
@sugarfi just shut it down again
@MrEconomical how? i wrapped it in a try-catch block.
@sugarfi process.exit()
@MrEconomical that's cheating! ok. Did you manage to get the flag?
@sugarfi too lazy to
@MrEconomical but it takes literally one line...
@MrEconomical Wow! It really does work! By the way @sugarfi , I broke the repl... Don't worry though, I didn't change the contents of it besides the flag.txt file...
I think someone changed the flag to a rickroll video... By the way, if it actually saves in the repl, please read my question where the flag once was. I want to know if I'm looking in the right place. I already tried the
.env
file and I could only find the password and some system-based stuff (like file paths)...