It happens, sometimes
- Description: Access the administration section of the website.
- Difficulty: Very Easy
🔎 Solution
The challenge provides a web page and asks the player to locate the admin panel.
To discover it, we can use directory brute-forcing tools like gobuster
.
However, since the challenge is relatively simple, manual guessing with common paths such as /admin
, /admin.php
,... is also effective.
In this case, the correct path is /admin
.
http://challenge01.root-me.org/realiste/ch3/admin/
Upon visiting this endpoint, a pop-up prompt appears asking for a username and password. Submitting random credentials and inspecting the traffic in Burp Suite reveals that the server uses a GET request for authentication instead of the more typical POST or PUT methods.

By forwarding the GET request from /admin
to Repeater and manually changing the HTTP method to PUT, the server responds with the flag - indicating that this was the expected solution path.

🚩Flag
0010110111101001