Tags: Medium WebExploitation picoCTF2023
- Launch the instance
- Open the URL
- On inspecting the source code, we can see that the input text of the form is being validated by
fetch()
with a get request to the/flag
endpoint. - Not really a regex match but we’ll try matching the known first characters of a flag, i.e.
picoCTF
. And it works!