Rating:

### Solution
> Open the page and prepare to be confused by the pretty (randomized) colors.  
>
> ![](https://media.discordapp.net/attachments/771504940623331378/773717067794612254/unknown.png)  
>
> Open up the Inspector Tool again, and we can see a long list of "div" elements with some style attributes listed in the tags. If we check our Sources Tab, we see there is only 1 file used. That means that all the JavaScript and CSS is included on the index.html File. Let's open a couple of these up and compare them.  
>
> ![](https://media.discordapp.net/attachments/771504940623331378/773720771683811338/unknown.png)  
>
> We can see that the site is using the "form" tag for every login section. If that is the case, we should be looking for an "action" setting or a Javascript script. If we scroll to the very bottom, we see a "script" tag that holds commands to login, including username and password credentials. However, 999 of these forms are false, so we should find the form that executes this script. A quick text search can do the trick.  
>
> ![](https://media.discordapp.net/attachments/771504940623331378/773721290526687312/unknown.png)  
>
> Only Form 673 lights up. Going to that form section on the page and entering the credentials we got from the script block will reload the page with the flag at the top.  
>
> ![](https://media.discordapp.net/attachments/771504940623331378/773721491661520896/unknown.png)  
#### **Flag:** nactf{cl13n75_ar3_3v11}