Welcome to your first security challenge. Can you find the vulnerability, exploit the system, and capture the flag?
Inspect the authentication system
Find and leverage the vulnerability
Get admin access and claim the flag