
Web 1. Toke Relaunch
Challenge description: We’ve relaunched our famous website, Toke! Hopefully no one will hack it again and take it down like the last time.
Once we access the static webpage we’re presented with a button that does nothing and some text.
Index.html

I had a look at the html and some js files, but found nothing on them. So that’s when I started checking if there were any common files on the web server, like .htaccess, .htpasswd, sitemap.xml or robots.txt. And it turned out there was a robots.txt file present:
1
2
User-agent: *
Disallow: /secret_xhrznylhiubjcdfpzfvejlnth.html
Curl’ing the file present on it (https://static.icec.tf/toke/secret_xhrznylhiubjcdfpzfvejlnth.html) gave us the flag:
 IceCTF{what_are_these_robots_doing_here} 
Web 2. Lights out
Challenge description: Help! We’re scared of the dark!
Again we get a static webpage, this time with nothing on it, just a question.
Index.html

So let’s inspect the html:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
<!doctype html>
<html>
    <head>
        <meta charset="utf-8" />
        <title>Lights out!</title>
        <link rel="stylesheet" href="main.css" />
    </head>
    <body>
        <div class="alert alert-danger">Who turned out the lights?!?!</div>
        <summary>
        <div class="clearfix">
            <i data-hide="true"></i>
            <strong data-show="true">
            <small></small>
            </strong>
            <small></small>
        </div>
        </summary>
    </body>
</html>
Apparently there is nothing on it, so I’ll also have a look at the css file. However, I’m going to use Chrome’s inspect, as it lets me have a look at each element separately.
Styles of .clearfix and tags: i, strong and small




So from there we can reverse the flag and get:
 IceCTF{styles_turned_the_lights} 
Web 3. Friðfinnur
Challenge description: Eve wants to make the hottest new website for job searching on the market! An avid PHP developer she decided to use the hottest new framework, Laravel! I don’t think she knew how to deploy websites at this scale however….
In this third challenge we get a website which lists jobs available on the market. We can see different pages:
Index.html

Jobs.html

And now inside each job we get some textareas to post data to the server.
Job panel

I spent much time thinking the vulnerability was there, when I accidentally came across an invalid path that threw an exception and, surprisingly, the flag as well:
Debug exception

So the flag is IceCTF{you_found_debug}.
