Hack the CTF
  • 🚩Welcome to Hack the CTF
  • Getting Started
    • ⭐Course Overview
    • ❓Why We Made This Course
    • 🔷Why CTFs are Important
    • Types of CTFs
    • Interesting CTF Info
  • Basics
    • Flag Format
    • Challenge Types (chals)
    • ✨Misc Terms & Rules
    • Tools and Methods
    • 🎮Let's Play
  • The Challenges
    • 🤔Learn, Hints, Solutions
    • 🟩EASY CHALS
      • 🟩Flag on a Function
      • 🟩Binary
      • 🟩Find and Watch
      • 🟩Lots of Them
      • 🟩Who Said This?
      • 🟩Click This Link
      • 🟩Remote Connect
      • 🟩Beeps and Beeps
      • 🟩Someone Not Use HTTPS
      • 🟩Cipher
      • 🟩Find Someone
      • 🟩CTF Page #2
      • 🟩Too Much Blue
    • 🟨MEDIUM CHALS
      • 🟨Hiding Right in Front of You
      • 🟨Base64 is the Answer
      • 🟨Hash of the Server IP Address
      • 🟨Query String
      • 🟨Literally in the Picture
      • 🟨Find the Texty Record
      • 🟨Where in the git is the Flag?
      • 🟨Websockets Delivery
      • 🟨Hacker Hid a File
      • 🟨I Hear Something
      • 🟨Where Am I?
      • 🟨Shakespeare is Hiding Something
      • 🟨CTF Page
    • 🟥HARD CHALS
      • 🟥Image Doesn't Work
      • 🟥Where is it?
      • 🟥Code Breaker
      • 🟥TV - Amateur Radio Way
  • Extra Resources
    • Where to Find More CTFs
  • Conclusion
    • Course Recap
    • 📝Quiz
    • 🦉Keep on Learning
  • SouthHills Info Request
Powered by GitBook
On this page
  1. The Challenges
  2. EASY CHALS

Click This Link

PreviousWho Said This?NextRemote Connect

Last updated 5 months ago

WEB | the attack surface of the modern world | EASY

This flag is a bit about simply understanding how web pages and web applications work, but then also about misdirection.

Hints

Even though the link doesn't function, make sure when you are clicking the link you look to see if you browser is sharing information about the link. You can also inspect the HTML tags for the web page.

Solutions

🟩
🟩
https://www.youtube.com/watch?v=fd372T1FvFo&list=PLFuCtJnW6S5iSDjIFa2QAjWi7BcKJBJhm