Hidden Deep Into My Heart
TL;DR
- Entry:
robots.txtdiscloses a hidden vault path and leaks a credential-like secret in a comment. - Execution: Enumerate under
/cupids_secret_vault/, discover/administrator, and authenticate with leaked creds. - PrivEsc: Not required (direct admin access from exposed credentials).
- Loot: Flag visible in the authenticated admin dashboard.
Context

This challenge is part of the Love at First Breach (2026) event on TryHackMe.
Recon
1) Inspect robots.txt
/robots.txt reveals both a sensitive path and a likely password string:
User-agent: *
Disallow: /cupids_secret_vault/*
# cupid_arrow_2026!!!Findings:
- Hidden content namespace:
/cupids_secret_vault/ - Credential candidate:
cupid_arrow_2026!!!
2) Enumerate hidden directory
ffuf -u http://<TARGET_IP>:5000/cupids_secret_vault/FUZZ \
-w /usr/share/seclists/Discovery/Web-Content/common.txtRelevant result:
administrator [Status: 200]Exploitation
1) Access admin login panel

Discovered endpoint:
http://<TARGET_IP>:5000/cupids_secret_vault/administrator
2) Authenticate with leaked credentials
Used:
- Username:
admin - Password:
cupid_arrow_2026!!!
Login succeeds and grants access to the admin dashboard.
3) Retrieve flag

Flag is directly exposed on the authenticated dashboard page.
Notes & Mitigations
- Do not place credentials/secrets in source comments, HTML, or
robots.txt. - Treat
robots.txtas public metadata; never list sensitive/private paths. - Enforce strong auth controls on admin routes (MFA, lockout/rate limiting).
- Remove hardcoded/default admin credentials and rotate compromised secrets.
- Restrict admin interfaces by network policy (VPN/IP allowlist) where possible.