Rating:

# Here's-a-Flag
Category: Web

Points: 150

Description: A quick teaser to get yourself ready for the challenges to come! Just look for/at the flag and perhaps try your hand at some frontend tomfoolery?

Url: http://very.uniquename.xyz:2086/

![CTF](https://github.com/ComdeyOverFlow/DeconstruCTF-2021/blob/main/Here's-a-Flag/images/Screenshot%20from%202021-10-02%2011-18-37.png)

# Examming Website

When We go to website, it was just normal. There is nothing interesting.

So let look at the page's source code.

As you can see, we can see three interesting. They are fake flag and index.js and styles.css. So let look at all.

If we look into index.js we can see base64 strings. Let decode it
![CTF](https://github.com/ComdeyOverFlow/DeconstruCTF-2021/blob/main/Here's-a-Flag/images/Screenshot%20from%202021-10-02%2011-20-42.png)

![CTF](https://github.com/ComdeyOverFlow/DeconstruCTF-2021/blob/main/Here's-a-Flag/images/Screenshot%20from%202021-10-02%2011-20-50.png)

Lol. That was just troll. ?
![CTF](https://github.com/ComdeyOverFlow/DeconstruCTF-2021/blob/main/Here's-a-Flag/images/Screenshot%20from%202021-10-02%2011-21-15.png)

So let look at the styles.css. In this file, you can see ROT13 string. Cool! Let decode this.
![CTF](https://github.com/ComdeyOverFlow/DeconstruCTF-2021/blob/main/Here's-a-Flag/images/Screenshot%20from%202021-10-02%2011-21-42.png)

When we deocde it with 23 Amount, we got flag.
![CTF](https://github.com/ComdeyOverFlow/DeconstruCTF-2021/blob/main/Here's-a-Flag/images/Screenshot%20from%202021-10-02%2011-28-39.png)

# Summary
Easy Challenge but give us a reminder to check all files in next ctf website.

# Flag
dsc{welcome_to_deconstructf}