lesion.io Blog
  • Roadmap
  • Docs
    • Templates
      • Data Inventory
      • Access Control
      • Cybersecurity Roles & Responsibilities
      • Asset Inventory
      • Acceptable Use Policy
      • Change Management
      • Vendor Risk Assessment Form
      • Password Protection Policy
  • About Us
    • Manifesto
    • Metrics
  • CTF Team
    • CISA ICS CTF 2024
      • Virbank
        • Mission: Inconceivable - 1
        • Mission: Inconceivable - 2
        • Extend Your Stay - 1
        • Extend Your Stay - 2
        • Extend Your Stay - 3
        • Extend Your Stay - 4
        • Follow The Charts - 1
        • Follow The Charts - 2
        • Read Askew Manuscripts - 1
        • Read Askew Manuscripts - 2
        • Read Askew Manuscripts - 3
        • Read Askew Manuscripts - 4
        • Read Askew Manuscripts - 5
      • Anville
        • Genisys of the Problems - 1
        • Genisys of the Problems - 2
        • Genisys of the Problems - 3
        • Modeling Trains - 1
        • Modeling Trains - 2
        • Modeling Trains - 3
      • Castelia
        • Page
      • Driftviel
        • Page 1
Powered by GitBook
On this page

Was this helpful?

Last updated 9 months ago

Was this helpful?

  1. We are tasked now with looking through the same .js file but looking now for the URL that the hackers are using to send the Credit Card information too.

  2. Analyzing the code we find a potential function that controls this.

  1. This function looks through the long array of bird names and grabs the first letter of each of the names from the names starting at index 776-808.

  2. Looking at the Bird Name Array we follow that index and get a Base64 encoded string.

  1. This gives us the string that contains the URL for the flag.

  1. CTF Team
  2. CISA ICS CTF 2024
  3. Virbank

Extend Your Stay - 4

PreviousExtend Your Stay - 3NextFollow The Charts - 1