It all starts with

  • Begin with a normal google search on Nahamsec’s CTF

Search : nahamsec giveaway ctf

You will see

  • Visiting the website to see whats in

Visting to Give you just an image

  • Since its a ‘Recon CTF’ lets run some domain sub-finder

Running Subdomain finders:

The following domains are received  

now, Lets check on

visiting the site you will get

Hmm seems like we need to be in the intranet

lets try putting in a header that Forwards the host 127.0.01 with the following header X-Forwarded-For:

lets try getting the login.php for admin

using the following Request

GET /admin/?/login.php HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,/;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: close
Cookie: __cfduid=d7deb9873b40714c1dad5ee2a8062d44e1578928064
Upgrade-Insecure-Requests: 1
If-Modified-Since: Wed, 08 Jan 2020 18:26:17 GMT
If-None-Match: "42-59ba507421ab2"
Cache-Control: max-age=0

Boom it says its moved to

lets go see there

looks like we need to search for dirs

Since its api i guessed its better to look for swagger

Boom lets see whats in the Get_flag

lets try running this thing

we click on try it out then

execute it and then


but sadly we got an Internal Server Error

lets try using that as a url?

lets visit

Opps looks like this thing asks for password

Remember there was a text

Where does someone leave their credentials? Github ofcourse

just search nahamsec CTF in github boom you get to jump to

go to

you will see

Boom here you go

now put in your username and password you get to see

"You are such a guru!, send this to"

Thanks :)