EOF{f0und_m3_f!nally}Challenge Description:
Solve your first challenge.
The INSTRUO 14 Website Team have spent a lot of time perfecting the website. Check it out!
And never forget the name of this CTF, it will serve as a reminder for the rest of your journey, that everyone is a fool.
Note: Flags, unless specified otherwise, will be of the format EOF{text}, text might include numbers and symbols as well.
curl -s https://instruo.tech/ | head -100
Observation:
curl -s https://instruo.tech/robots.txt
Result: No robots.txt file found (404 response)
curl -s https://instruo.tech/ | grep -i "eof\|flag\|fool" -A 2 -B 2
Result: No direct flag patterns found in HTML source
curl -s https://instruo.tech/ > page.html
cat page.html
Key Findings:
/assets/index-ZgcoQM9t.js/assets/index-DUKRed5p.cssBased on the challenge hint about "EOFool" (Everyone's a Fool), the events page was checked:
curl -s https://instruo.tech/events | tee events.html | head -200
Observation: Same HTML returned - typical SPA behavior
curl -s https://instruo.tech/assets/index-ZgcoQM9t.js > main.js
grep -i "fool" main.js | head -10
Key Finding: The word "fool" appears in the context of "eofool" event
grep -E 'f0und_m3_f.*nally' main.js
After examining the context, the complete flag was identified in the "eofool" event section.
Examining the minified JavaScript revealed:
<span> elementfontSize: "0.1rem" and color: "transparent"✅ SUCCESS! Flag: EOF{f0und_m3_f!nally}
The flag was hidden in a React component for the EOFool event page with CSS transparency!
EOF{text} patterncurl - HTTP client for downloading web resourcesgrep - Pattern matching and flag searchMethod 1: Browser Developer Tools
Method 2: Network Tab Analysis
# 1. Initial reconnaissance
curl -s https://instruo.tech/ | head -100
# 2. Check for robots.txt
curl -s https://instruo.tech/robots.txt
# 3. Download full HTML
curl -s https://instruo.tech/ > page.html
# 4. Search HTML for flag patterns
grep -i "eof\|flag\|fool" page.html
# 5. Check events page (based on CTF name hint)
curl -s https://instruo.tech/events > events.html
# 6. Download JavaScript bundle
curl -s https://instruo.tech/assets/index-ZgcoQM9t.js > main.js
# 7. Search for "fool" keyword
grep -i "fool" main.js
# 8. Search for flag pattern
grep -E 'f0und_m3_f.*nally' main.js
# 9. Extract and verify flag
echo "EOF{f0und_m3_f!nally}"
Welcome Everyone is an excellent introductory web challenge that teaches fundamental CTF skills:
The flag EOF{f0und_m3_f!nally} celebrates the solver's first success, encouraging them with the message "finally found me!" The clever CSS hiding technique (transparent color + tiny font size) introduces the concept that data can be present but invisible, a recurring theme in CTF challenges.