Tags: web 

Rating:

# Slash slash

## Task

![task](./src/task.png)

[handout_slashslash.7z](./src/handout_slashslash.7z)
## Solution

Extracting file will give us folder with web application. I think, author thought we will run this, but all I did is looked through files. In the app/env/bin/activate file I found this:

![active](./src/active.png)

And I tried to decode base64 and here is the flag:
`encryptCTF{comments_&_indentations_makes_johnny_a_good_programmer}`

Original writeup (https://github.com/0awawa0/CTF-Writeups/tree/master/ENCRYPT%20CTF%202019/Web/Slash%20slash).