Tags: web 

Rating: 5.0

**Step 1**

Use the Network Tab and see for the scripts being loaded, there we see a suspicious script named as "custom.js"

[https://imgur.com/QzcXC8B](https://imgur.com/QzcXC8B)

**Step 2**

On analysing the code inside the script, we see a password field as "if(u == "admin" && p=== ....)" with URIComponent

[https://imgur.com/RKaPGp1](https://imgur.com/RKaPGp1)

**Step 3**

Use the Developer tab to decode the URIComponent

[https://imgur.com/R0xgQy4](https://imgur.com/R0xgQy4)

**Step 4**

Viola you have your flag

[https://imgur.com/xPB2yos](https://imgur.com/xPB2yos)