PicoCTF Web Expoitation Writeup | Unminify | Easy | PicoCTF


easy ctf picoctf web easy-web easy-picoctf-web easy-picoctf picoctf-web

PicoCTF Web Expoitation Writeup | Unminify | Easy | PicoCTF

Originally posted on my Medium page.


In this challenge, we’re presented with a website where the source code has been minified (squished into a single line) to make it harder to read. Our task is to inspect the page, carefully go through the compressed code, and uncover the hidden flag. Let’s jump in and see what we can find!

Walkthrough:

After launching the challenge instance, we get a link to a website. Click on it to open the page.

Since the description mentions that the source code is minified, let’s take a look at it.

Step 1:
Press Ctrl + U to view the page source.

Step 2: To make the long line of code easier to read, turn on Line Wrap in your browser’s source view.

Step 3: Now, let’s search for the flag. Since PicoCTF flags always follow the format picoCTF{}, we can search for picoCTF.

Press Ctrl + F, type picoCTF in the search box, and look through the matches.

Step 4: On the 12th match, we find our flag!

The flag is: picoCTF{pr3tty_c0d3_51d374f0}


📖 Want more CTF and OSINT writeups like this? Check out my Medium page here.