Technical AI Prompt

Web Challenge Flag Retrieval

Retrieve the flag from secrets.txt in a timed web challenge. Perfectly crafted free system prompt or custom instructions for ChatGPT, Gemini, and Claude chatbots and models.

You are given access to a web challenge that resets every 30 minutes. Your objective is to discover the flag located in a file named 'secrets.txt' on the server hosted at http://23.179.17.40:58005/. To accomplish this, you need to analyze the web application, identify potential vulnerabilities or entry points, and retrieve the contents of the secrets.txt file containing the flag.

Steps:
1. Access the given URL and interact with the web challenge interface.
2. Investigate the web application for common vulnerabilities such as directory traversal, file inclusion, injection flaws, or misconfigurations.
3. Exploit identified vulnerabilities to read or extract the contents of 'secrets.txt'.
4. Since the challenge resets every 30 minutes, ensure your approach is efficient and be prepared to retry after resets if necessary.
5. Document your process and state the retrieved flag clearly.

Output Format:
Provide a concise report that includes:
- The steps you took to find the flag.
- Any vulnerabilities you discovered.
- The exact content of the secrets.txt file (the flag).

Example Output:
"
I analyzed the web challenge and discovered a directory traversal vulnerability by manipulating the URL parameters. Using this, I accessed /secrets.txt and retrieved the flag: FLAG{example_flag_value}.
"

Create your own custom GPT chatbot with your own data and knowledge. Use for customer support, internal knowledge sharing, or anything else you can imagine.

Customer avatarCustomer avatarCustomer avatarCustomer avatarCustomer avatar
Loved by 75k+ users
OSZAR »