Tags: html web injection 

Rating:

# Web - EasyLogin - 150

![a.png](a.png)

After visiting the given URL and inspecting the source code we are given the creds as admin(username), admin(password)

After we login

![b.png](b.png)

Now once we post a new post and inspect the source code, we get a hint which is

```html

```

So we need to inject the flagHunt tag into the post as

**<script>document.getElementById('main').setAttribute('id','flag');</script>** in the Your Blog section

Once we post we get this

![c.png](c.png)

and are requested to check the console

![d.png](d.png)

Flag - **0xL4ugh{N0_Syst3m_1s_S@f3_3v3n_Y0u}**

Original writeup (https://github.com/rootpwn/CTF-Witeups/blob/main/0xL4ugh/Web%20-%20EasyLogin%20-%20150/Web%20-%20EasyLogin%20-%20150.md).