# NISRA - different places
###### tags: `NISRA` `CTF` `Web`
Challenge: [different places](http://chall2.nisra.net:41025/)
## Exploit - Integrate Fragments Flags
1. View Page Sources


2. base64 decode
`dXNlcm5hbWU6YWRtaW5fcGFzc3dvcmQ6bmlzcmE=` $\to$ `username:admin_password:nisra`
3. Observe the form
It uses get method to fetch the parameters. So we can peek `login.php` first.

Then we could use the username and password we got at previous step.
Payload: `view-source:http://chall2.nisra.net:41025/login.php?username=admin&password=nisra`
Then we got the last fragment flag.
:::spoiler Whole flag
`NISRA{KaN_y0u_fIND_FlA9_a7_dIff3R3n7_5Pac32}`
:::