Natas 6:
Solution: First i navigated to see the sourcecode of that challenge. After seeing that "include "includes/secret.inc"; " in that PHP code. I tried to access the following link: "http://natas6.natas.labs.overthewire.org/includes/secret.inc" I found the secret text and typed in secret text box . And i got the credentials of next level in simple way :-) Result :: natas7 is 7z3hEENjQtflzgnT29q7wAvMNfZdh0i9 Natas 7: Solution:After seeing hint in source page <!-- hint: password for webuser natas8 is in /etc/natas_webpass/natas8 --> So i navigated to all pages in site and i found there is local file vulnerability. And i typed the following URL and got the Natas 8 credentials "http://natas7.natas.labs.overthewire.org/index.php?page=/etc/natas_webpass/natas8" Result:: natas8 password :: DBfUBfqQG69KvJvJ1iAbMoIpwSNQ9bWe Vulnerability: Local File Inclusion Vulnerability Local File Inclusion (also known as LFI) is the process of including files on a server through the web browser. This vulnerability occurs when a page include is not properly sanitized, and allows directory traversal characters to be injected. To Prevent these kind of attacks check the following link: http://hakipedia.com/index.php/Local_File_Inclusion
0 Comments
Natas 3
solution: After seeing the hint in source page.(<!-- No more information leaks!! Not even Google will find it this time... -->) Then started seeing robots.txt in same directory And i found the following line in that robots.txt page User-agent: * Disallow: /s3cr3t/ In that s3cr3t page i have found user.txt file.After opening that file i found next level username and password. natas4 : 8ywPLDUB2yY2ujFnwGUdWWp8MT4yZrqz Natas 4 solution: After seeing the Error message displayed in that page . I decided to to send this page request using referrer 'http://natas5.natas.labs.overthewire.org' in header . For that i used Tamper Data addon in firefox and changed the Referrer field in that header . After doing these steps i got credentials of next level. The password for natas5 is iX6IOfmpN7AYOQGPwtn3fXpbaJVJcHfq Natas 5 Solution: Error message throws saying that you have to log in to access this page. So i checked all the details of the page .And i noticed the cookie "loggedin" set as 0 And i changed that value into 1 and using Firefox Addon "Cookies Manager+ " And i refreshed that page and got credentials of next level. Natas 6 : aGoY4q2Dc6MgDq4oL4YtoKtyAg9PeHa1 Vulnerability: Cookie Poisoning : Cookie Poisoning attacks involve the modification of the contents of a cookie (personal information stored in a Web user's computer) in order to bypass security mechanisms. Using cookie poisoning attacks, attackers can gain unauthorized information about another user and steal their identity. To prevent Cookie Poisoning follow this link: http://stackoverflow.com/questions/1633062/how-to-prevent-cookie-poisoning |
Details
Categories
All
Archives
June 2017
Vivek N
An idea can change your life :) |