Maze

Date: 19, December, 2020

Author: Dhilip Sanjay S


  • Find the directories using gobuster

root@kali: gobuster dir -u http://maze.noobarmy.org/ -w /usr/share/wordlists/dirb/common.txt -t 50 | tee gobusterOutput2.txt
===============================================================
Gobuster v3.0.1
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@_FireFart_)
===============================================================
[+] Url:            http://maze.noobarmy.org/
[+] Threads:        50
[+] Wordlist:       /usr/share/wordlists/dirb/common.txt
[+] Status codes:   200,204,301,302,307,401,403
[+] User Agent:     gobuster/3.0.1
[+] Timeout:        10s
===============================================================
2020/12/19 23:00:37 Starting gobuster
===============================================================
/.htpasswd (Status: 403)
/.hta (Status: 403)
/.htaccess (Status: 403)
/index.php (Status: 200)
/projects (Status: 301)
/server-status (Status: 403)
===============================================================
2020/12/19 23:01:22 Finished
===============================================================
  • Go to http://maze.noobarmy.org/projects

    • View source code.

    • You will find this commented:

  • Navigate to http://maze.noobarmy.org/projects/justsomerandomfoldername/image-0.png

    • You'll find a QR code.

    • By continuing, QR codes will be available till image-27.png.

      • P.S: 27 is my lucky number

    • Manually doing this is a tedious process.

  • Use zbar-tools:

    • apt-get install zbar-tools

    • Bash one liner (curl + zbarimg):

  • Upload the image-13.png or paste the URL in Exif toolarrow-up-right. You'll get the following data:

  • ROT 13 decode the creator data to get the flag.

Last updated