Upon loading the page, users can view the source code, spotting the img tag leading to a black pixel image, as well as a hidden endpoint /files.
Visiting this endpoint reveals a directory listing vulnerability, providing access to files and directories.
Users can view the ‘users.txt’ file, containing a list of usernames and passwords, including the ‘natas3’ password, needed to progress to the next level.