Points: 250
Web Exploitation
There is a website running at http://2018shell1.picoctf.com:21579 (link). Try to see if you can push their buttons.
What's different about the two buttons?
Follow the buttons and get Rick Roll'd!
In boo.html, looking at the source, we can see that button2.php is expecting a POST request. As such, all we have to do is send a POST request and get the flag.
Working solution solve.py
picoCTF{button_button_whose_got_the_button_ed306c10}