Pwn The Scam 1 - Find Me

Aperi'CTF 2019 - OSINT (100 pts).

Aperi’CTF 2019 - Pwn The Scam 1 - Find Me

Challenge details

Event Challenge Category Points Solves
Aperi’CTF 2019 Pwn The Scam 1 - Find Me OSINT 100 13

Un site de scam Bitcoin a été découvert sur TOR. Vous avez été missionné pour en prendre le contrôle.

Pwn The Scam est un challenge d’OSINT, il n’y a pas de vulnerabilité web à exploiter! Format de flag : APRK{flag}.

Investiguez sur ce que vous avez à disposition, chaque élément peut être déterminant.


Browse URL with TOR then directory listing on /free-btc/css leads to /free-btc/css/adm.css finnaly guess the admin page /free-btc/admin, flag is in html comments.



The challenge URL is http://ylsspycahtqrv3u2.onion which is a TOR URL. To browse the website, we’ll use tor-browser software. The index http://ylsspycahtqrv3u2.onion/free-btc/.


Directory Listing

There is no form, the begin of the index.html source code is:

<!DOCTYPE html>
<html lang="en">


  <meta charset="utf-8">
  <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
  <meta name="description" content="">
  <meta name="author" content="">

  <title>BTC x100</title>

  <!-- Bootstrap core CSS -->
  <link href="css/bootstrap.min.css" rel="stylesheet">

  <!-- Custom styles for this template -->
  <link href="css/landing-page.css" rel="stylesheet">


We got only one folder: /css, if we look at it we got a directory listing:


Guess / Fuzzing

On the directory listing, we can notice the file adm.css. We can suppose there is an admin page. We can either use dirb with proxychains to fuzz directory or guess the admin page with multiple try: http://ylsspycahtqrv3u2.onion/free-btc/admin


HTML Comments

As said in the summary, there is no web vulnerability. Looking at the html comment we got the flag:

<title>BTC x100 - Admin</title>

<link rel="stylesheet" href="../css/adm.css" />

<div class="login-page">
  <div class="form">
    <form class="login-form" method="POST">
      <input type="password" placeholder="password" name="p"/>

<!-- APRK{$4dm1n_P4g3$} -->



Challenge by DrStache , WriteUp by Zeecka