In this write-up, I analyze the "Cool Name Effect" web security challenge and document the steps taken to reach the flag.

We notice that the challenge presents a web page with an input field where the user is asked to enter a name.

None

At first, I tried entering a random name to observe how the application responds.

None

Upon entering a name, we notice that the input is reflected directly on the page.

This behavior immediately raised suspicion of a possible XSS vulnerability

I then tried injecting a simple script to see how the application would handle it, but no visible result appeared.

None

After that, I moved on to inspect the page source code.

None

After inspecting the source code, it was clear that the value provided in the name parameter is directly injected into the HTML content without any form of sanitization or encoding. The input is reflected back on the page dynamically, indicating that the application does not properly validate or escape user-controlled data before rendering it.

This behavior clearly points to a reflected XSS vulnerability, where arbitrary input can be processed and displayed by the browser as part of the page. For readers who want to understand this type of vulnerability in more depth, detailed explanations and examples can be found on PortSwigger

After that, I injected the following payload, which executed successfully and allowed me to retrieve the flag:

 Z3DX </h1><svg onload=alert(1) </h1>
None

flag is : ciyypjz

See you soon! 👋😄

#CyberSecurity #WebPentesting #CTF