Rating:

ok so looking at the site dosent really show much. There is a gif and nothing else.

In the `robots.txt` file we can find that there is a `elliot.html` file. Lets check this out.

The `alt` tag of the gif says `check my js` so lets do this and we get:

```
(![]+[])[+[]]+(![]+[])[!+[]+!+[]+!+[]]+(!![]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]])[+!+[]+[+[]]]+([][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]]+[])[!+[]+!+[]+!+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+[]]+(+[![]]+[+(+!+[]+(!+[]+[])[!+[]+!+[]+!+[]]+[+!+[]]+[+[]]+[+[]]+[+[]])])[+!+[]+[+[]]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]+!+[]]+(![]+[])[!+[]+!+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(!![]+[])[+[]]
```

excecuting it we get `fsocietyislit`.
A bit of googleing reveals its `JSFuck`

lets see what else we can find with dirb:
`dirb http://web.zh3r0.ml:8005/ -z 100 -t -o dirb
`
*Note: -z 100 is used to get a ms timeout between tryes. Since the server respondet with 503 everytime*

ok `dirb` found a directory (`code`) and inside that we have a file `flag.php`

This file says: `
Elliot need to submit hash here to get the flag.
`

if we send a negativ hash we get `Dont try to mess with fsociety`

Dont seem to find anything useful so lets try to get them what they want.

If we send them the JSFuck keyword `fsocietyislit` hashed as md5 we get the flag!

## Flag
zh3r0{ell1ot_y0u_4r3_1n}