Rating: 3.0

# Web - DarkLogin - 200

![a.png](a.png)

This was one of the toughest challenge(for me being a Noob)

Visiting the URL gives me

![b.png](b.png)

After looking at the page's source code

```html




```

The last line decodes(base64) as **.txt**

Since the words KEY is in CAPS I tried going to - [http://40.112.217.104/DarkLogin/KEY.txt](http://40.112.217.104/DarkLogin/KEY.txt)

we get

![c.png](c.png)

we can see that email and password are encoded

Email - **[email protected] —> 21232f297a57a5a743894a0e4a801fc3 —> admin**(MD5) use [https://crackstation.net/](https://crackstation.net/) to decode

Password -

![d.png](d.png)

**Cyberchef Receipe**

Unescape_string()
From_Base64('',true)
Unescape_string()
Unescape_string()

So we get

username - **[email protected]**

password - **W3@llL1k3D@rkn3ss**

Once we login into the portal

we get

![e.png](e.png)

So I tried Injecting XSS Payload into the field

![f.png](f.png)

After giving some random valid input

![g.png](g.png)

After inspecting the source code I have got a Interesting js file named **.xss.js**

![h.png](h.png)

So this checks if flag ID exists or not I took help from my friend and figured out the right syntax as

`<script>document.getElementById('main').setAttribute('id','flag');</script>`

This basically creates a ID called flag so that that script get's executed.

After injecting the above piece of line as code I get the following screens and I was asked to check the Console

![i.png](i.png)

![j.png](j.png)

After checking the web console I have got a mega link

![k.png](k.png)

After opening the file in the mega link

![l.png](l.png)

I get a pastebin link and a PHP file

Pastebin Link - [https://pastebin.com/YdLpbznz](https://pastebin.com/YdLpbznz) which is Password protected

I was unable to view the contents of - [http://40.112.217.104/DarkLogin/796f754e6f774d650a.php](http://40.112.217.104/DarkLogin/796f754e6f774d650a.php) as it redirects to an error page

I tried logging in by changing the post URL in the login page as the given php file and I get the password ( I am not sure why that worked :{ )

![m.png](m.png)

and I finally get the Flag as

![n.png](n.png)

Flag - **0xL4ugh{M1nd_Bl0w1ng_15_C00l}**

Original writeup (https://github.com/rootpwn/CTF-Witeups/blob/main/0xL4ugh/Web%20-%20DarkLogin%20-%20200/Web%20-%20DarkLogin%20-%20200.md).