- page source
[Ctrl + U]
- page source
[Ctrl + U]
- url +
/files
- url +
/robots.txt
& url +/s3cr3t/
- Edit the
Referer
value
- Set
Cookie: Loggedin=1
- url +
includes/secret.inc
& page source - url +
index.php?page=/etc/natas_webpass/natas8
- Decode the encoded secret:
OverTheWire-Writeups/natas/code/natas8.php
Lines 1 to 10 in c6f9570
- Find words containing:
a /etc/natas_webpass/natas10;
- Find words containing:
a /etc/natas_webpass/natas11
- First find the XOR key used by the server side using default cookie data:
then set $default_data["showpassword"] = "yes"
:
OverTheWire-Writeups/natas/code/natas11.php
Lines 1 to 22 in 504cad6
- Upload a php file to print the output of the command
cat /etc/natas_webpass/natas13
.OverTheWire-Writeups/natas/code/natas12.php
Lines 1 to 6 in 42949a4
filename
request parameter to a string with.php
extension:
-
We need to put jpeg's magic number
ff d8 ff e0
to the beginning of the file.OverTheWire-Writeups/natas/code/natas13.py
Lines 1 to 15 in 43b8535
-
Add
debug
key to the query parameters:
SQL Injection: username = " or true; --
& password = <Anything>