OVERTHEWIRE NATAS SERIES: 25 – 26 LEVEL Walkthrough

Overthewire Natas Level 25 – 26 is based on directory traversal. The code have many restrictions because it sanitizes the user input and makes it harder for us to get the password. Let’s see how can we bypass it and get the access for the next level. The code for […]

Advertisements

OVERTHEWIRE NATAS SERIES: 24 – 25 LEVEL Walkthrough

Overthewire Natas 25 Level is based on strcmp() function vulnerability. Generally, strcmp() is used to compare two strings together, We need to generate some kind of error here so we can obtain the password for the next level. The code for the level is here: So, I tried a lot […]

Advertisements

OVERTHEWIRE NATAS SERIES: 19 – 20 LEVEL Walkthrough

OVERTHEWIRE NATAS level 19-20 is similar to 18-19 level. We have to manipulate session in order to login as admin. In the last level, we just have to change the PHPSESSIONID number in order to gain the access to the admin account. We have to do the same in this […]

Advertisements

OVERTHEWIRE NATAS SERIES: 16 – 17 LEVEL Walkthrough

The walkthrough for the last level is available on this link: http://www.anonhack.in/2018/09/overthewire-natas-series-15-16-level-walkthrough/ This level is little bit similar to the last level. Here we have to perform a command injection. Let’s have a look at the source code of this level: See the highlighted text in the code above. $key variable […]

Advertisements

GoldenEye 1 Walkthrough: Vulnhub vulnerable machine

This article is a walkthrough for GoldenEye vulnerable machine. In the description of this machine, it says that it is similar to OSCP machine. So, I have written a walkthrough on it. To download Goldeneye 1, follow the link: https://www.vulnhub.com/entry/goldeneye-1,240/ Requirements: Kali Linux or your favorite OS Virtualbox Goldeneye VM Patience […]

Advertisements

Vulnix Vulnerable VM CTF: Walkthrough

This article is a walkthrough on vulnix CTF challenge. You can get this on Vulnhub website: here is the link. Vulnix is a specially made vulnerable virtual machine of SSH and NFS [Network file system]. Vulnix will guide you on how false configuration of NFS can be used to escalate […]

Advertisements

SkyTower CTF Walkthrough

The following article is a walkthrough for Skytower Vulnerable machine. This machine is a web application Capture the flag machine. This machine is filtered and an appropriate methodology is required here. Objectives: Obtain the flag.txt file from /root/ So let’s dive: Tools: Virtual Machine or VMware Kali OS I located […]

Advertisements

BOB Walkthrough: Vulnhub CTF Challenge

This article is a walkthrough on how I solved Bob CTF challenge. You can download Bob CTF via this link: https://www.vulnhub.com/entry/bob-101,226/. It is a Beginner to intermediate challenge and at the end we have to gain the root access and get the flag. So let’s do this: To find the vulnerable […]

Advertisements