Challenge Name:
Christmas Wonderland
Category:
Web
Challenge Description:
Nisserne har dedikeret en hjemmeside til deres Wonderland. Besøg siden, nyd stemningen og måske kan du finde et flag.
https://tryhackme.com/jr/xmaswonderland
Approach
The flag was constructed by piecing together information from various sources:
- Flag Prefix:
NC3{c0was found by decodingTkMze2Mwin{URL}/private/. - Flag Middle part 1:
zy_chrwas found by decodingenlfY2hyin{URL}/index.html(container class) - Flag Middle part 2:
|stm@swas found by decodingfHN0bUBzin{URL}(downloading a redirect html!) - Flag Suffix:
_ctf_challenge}was found by assembling the 3 javascripts in{URL}/js/payloadA.js,{URL}/js/payloadB.js&{URL}/js/core.js. Final script can be found here
The full base64
TkMze2Mw enlfY2hy fHN0bUBz X2N0Zl9j aGFsbGVu Z2V9
TkMze2MwenlfY2hyfHN0bUBzX2N0Zl9jaGFsbGVuZ2V9
Flag
NC3{c0zy_chr|stm@s_ctf_challenge}
Reflections and Learnings
This challenge highlighted the importance of interpreting hints and context carefully when direct extraction of flag components is not straightforward. Sometimes, guessing based on strong contextual clues is necessary when faced with ambiguity in code obfuscation.