1. Remember to turn on the `pretty print` in `DevTools` (As mentioned in Hint, the source code is [obfuscated](https://obfuscator.io/). ![](https://hackmd.io/_uploads/HJTMOnXn2.png) 2. I set several breakpoints (the red dots) to see how the code works, and what contains in the array `_0x5a46` looks suspicious![](https://hackmd.io/_uploads/BJORv2Q22.png) 3. I grab some possible elements inside, assemble them then get `picoCTF{not_this_again_50a029}`, and it turns out to be correct :) <hr> Another method (credit to [this article](https://ithelp.ithome.com.tw/articles/10246749)) is to use `console` to inspect the stored items like this: ![](https://hackmd.io/_uploads/BJh0j2Xnn.png) The output is overlapped, ![](https://hackmd.io/_uploads/HJBW33mnh.png) (img from the article) So we just have to use part of them.