25 Dec 2020 - OverTheWire - Natas
website: http://natas2.natas.labs.overthewire.org (Password: ZluruAthQk7Q2MqmDeTiUij2ZvWy2mBi)
This time no password is contained in the page source, but it is embedded with a PNG file:
<img src="files/pixel.png">
From the file path, we know that this is a file stored on the server. Typing the link “http://natas2.natas.labs.overthewire.org/files/” in the browser, I realized that directory browsing on this website is not disabled. Going through that directory and I found a file for the next level password: sJIJNW6ucpu6HPZ1ZAchaDtwd7oGrD14.
CONCLUSION
This level is about directory browsing vulnerability, which is a type of Security Misconfiguration in OWASP Top Ten. For more details, please refer to links below for more details:
«Prev | More About | Next» |
---|---|---|
Add Categories In Jekyll | OverTheWire - Natas | Adding Comments In Github Pages |