Finally, with level 7 of OverTheWire's Natas wargame, we start to get to more "real world" vulnerabilities. It's still very easy, but it's at least getting better.
We start with a single page, that has 2 navigation links.
I noted that the URLs had a "page=" parameter. I thought maybe this would be the file it was including. Viewing the source gave a nice reminder of where the password for the next level would be stored.
I then tried a directory traversal exploit, pointing to the password file for the next level. It successfully displayed the password.
Tuesday, November 6, 2012
OverTheWire Natas Level 7
Labels:
directorytraversal
hacking
natas
overthewire
wargames
linux linux linux
OverTheWire Monxla Part 3Nov 26, 2012
OverTheWire Monxla Part 2Nov 25, 2012
OverTheWire Monxla Part 1Nov 24, 2012
Author: Unknown
Waythemes is a blogger resources site is a provider of high quality blogger template with premium looking layout and robust design
Labels:
directorytraversal,
hacking,
natas,
overthewire,
wargames
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment