This is a puzzle. You will need to solve the puzzle to obtain
the coordinates of the cache.
This puzzle is the first in a potential series of puzzles
involving computer security. For each of these puzzles, I will
provide a link to a webpage (or other resource) that suffers from a
security vulnerability. It will be up to you to exploit that
vulnerability to obtain the coordinates of the cache.
In addition to a link to the vulnerable resource, I will provide
guidance to you regarding the nature of the vulnerability. It is
very important that you do not stray far from the intended attack
vector. If you have any doubts, at any time or for any
reason, please contact me before proceeding.
The security vulnerability will never be placed
on the cache page itself. After you have looked at the information
on the cache page, please follow the provided link and direct your
efforts on that resource. You should never attempt to
discover or exploit security vulnerabilities in geocaching.com or any resource
other than the ones provided explicitly for the purposes of these
puzzles.
Please contact me if you are ever unsure of the intended attack
vector. I will let you know if you are on the right track. This
game is intended to be fun and educational, but it is important
that we play within the boundaries. You are ultimately
responsible for your own actions.
Depending on the response to this puzzle, I will create others
in the series. Without further ado, please click on the picture
below to link to your first challenge.