/proc/self/fd)To start the challenge, I ran a directory brute-force using Gobuster to identify hidden directories and files.

Upon navigating to http://127.0.0.1:8081, we are redirected to /login.php, suggesting a session-protected environment.

However, when intercepting the request to /, we noticed that the full page content is loaded first, and only then the redirect happens. This leak reveals a hidden message on the page.

The message revealed a hidden PHP file path:
/0xf4h1dd3nd1r3ctory.php
Accessing the hidden PHP file gave us access to a downloadable backup.zip containing the full source code of the web app.
After unzipping it, we inspected the main logic in index.php: