<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>XSS on</title><link>/tags/xss/</link><description>Recent content in XSS on</description><generator>Hugo -- gohugo.io</generator><lastBuildDate>Mon, 14 Jul 2025 18:27:16 +0100</lastBuildDate><atom:link href="/tags/xss/index.xml" rel="self" type="application/rss+xml"/><item><title>Puzzle 4 - L3akCTF 2025</title><link>/post/l3ak-puzzle4/</link><pubDate>Mon, 14 Jul 2025 18:27:16 +0100</pubDate><guid>/post/l3ak-puzzle4/</guid><description>Just when we thought we had the system figured out, the authors straight up yeeted the crutch from underneath us: the reference image. The url field in the API response was some nonesense that led nowhere. We were essentially flying blind.
This challenge was a two-act play. First, solve a jigsaw puzzle with no picture on the box, that would award us with the source code for the platform. Second, use that source code to scout for a vulnerability that would yield us the flag.</description></item></channel></rss>