iFantasticLife


> ping my.next.stop
Destination unreachable...

Natas0 And Natas1 Solution

23 Dec 2020 - OverTheWire - Natas

In this series, I will dive into Natas, a CTF-like wargame offered by the OverTheWire community. Natas teaches the basics of server-side web application security and covers many of OWASP Top Ten Web Application Security Risks. It consists of different levels, and each level contains the password to the next level. In this wargame, your job is to crack each password and level up.

Let’s start with natas0. According to the hint on that webpage, the password for the next level is on this page. Right click and view page source. There is the password for level 1: gtVrDuiDfck831PqWsLEZy5gyDz1clto.

Once in natas1, we can see that rightclicking is blocked. No worries. We can still view page source from a web browser’s menu. Again the password is hardcoded in a comment line: ZluruAthQk7Q2MqmDeTiUij2ZvWy2mBi.

Hardcoding sensitive information is still something we can see occasionally if not all the time. Besides that, sometimes you may also find sensitive information in an application’s log files, and even worse, maybe in plaintext! No idea? Just take a look at this article: How the Twitter and GitHub Password Logging Issues Could Happen.


«Prev More About Next»
Code Syntax Highlighting OverTheWire - Natas Add Categories In Jekyll

Please leave your comments below.