URL: http://natas7.natas.labs.overthewire.org
Open the Website:
Exploration:
Page Navigation: Clicking on the "home" and "about" pages reveals the following links:
Hint in Source Code: Inspecting the source code provides a hint about how the application includes pages.
Exploit:
URL Parameter Manipulation: Replace the
page
parameter with the desired file path:
Success:
You have successfully manipulated the URL parameter to access the password for natas8. Proceed to the next level using the acquired information.
PS: In Natas0, it was stated that
All passwords are also stored in /etc/natas_webpass/. E.g. the password for natas5 is stored in the file /etc/natas_webpass/natas5 and only readable by natas4 and natas5
That is how we know that the file we are looking for is /etc/natas_webpass/natas8
______________________________________
NthApostle
Comments
Post a Comment