mcscCTFWebCTFWriteup
mcscCTF: TrustIssues
2025-08-25•Athul Prakash NJ (@psychoSherlock)
TrustIssues - Web Security Challenge
Challenge Overview
Category: Web
Difficulty: Easy
Skills Required: JavaScript Analysis, Web Reconnaissance, Client-side Security
The enemy left behind a portal that looks like a login screen… but something feels off. Your mission is to infiltrate it. Don't just trust what you see on the surface. Gain access, step through the portal, and follow the trail. But beware, not everything beyond is what it seems…
Files Provided
All challenge files can be downloaded from the GitHub Repository
Hints
Rumor says that the enemy was fooling us all in the first place. There is neither a portal nor a trail just some code not even hidden in plain site but in plain script
Solution
Analysis Approach
- Visit the challenge portal and inspect the login screen
- Open the browser developer tools and review the JavaScript files
- Find the hardcoded username and password in the client-side code
- Log in using these credentials; you will be redirected to
/login - The
/loginendpoint rick rolls you, but the flag is hidden in the JavaScript logs
Step-by-Step Solution
Step 1: Access the Challenge
- Go to http://challenges.mcsc.space:9090/
- Open browser developer tools (F12)
Step 2: Find Credentials
- Inspect
index.jsfor hardcoded username and password - Use these credentials to log in
Step 3: Find the Flag
- After login, you are redirected and rick rolled
- Check the JavaScript logs in the code:
// These logs might not be seen due to immediate redirect
console.log("Extracting user metadata...");
console.log("IP address logged: Tracking initiated");
console.log("Breach pattern matches known enemy signature");
console.log("Deploying countermeasures...");
console.log("mcsc{s3cr3t_4rmY_r1ckr0ll3d}");
});
- The flag is:
mcsc{s3cr3t_4rmY_r1ckr0ll3d}
Author
Created by psychoSherlock
GitHub Repository: View Challenge on GitHub