OverTheWire - Natas
Info
Natas 0 -- Basic Auth
➜ curl http://natas0.natas.labs.overthewire.org -u 'natas0:natas0' -s | sls password
You can find the password for the next level on this page.
<!--The password for natas1 is 0nzCigAq7t2iALyvU9xcHlYN4MlkIwlq -->Natas 1 -- HTML Comment
➜ curl http://natas1.natas.labs.overthewire.org -u 'natas1:0nzCigAq7t2iALyvU9xcHlYN4MlkIwlq'
...
You can find the password for the
next level on this page, but rightclicking has been blocked!
<!--The password for natas2 is TguMNxKo1DSa1tujBLuZJnDUlCcUAPlI -->
...Natas 2 -- Files Disclosure

Natas 3 -- robots
Natas 4 -- Referer
Natas 5 -- Edit Cookie
Natas 6 -- Information Disclosure

Natas 7 -- LFI
Natas 8 -- Encode Reverse
Natas 9 -- Command Injection

Natas 10 -- Command Injection (2)
Natas 11 -- Crib



Natas 12 -- Upload webshell

Natas 13 -- Upload image webshell
Natas 14 -- SQLi (Basic)

Natas 15 -- SQLi (Blind)

Natas 16 -- Command Injection (Blind)

Natas 17 -- SQLi (Timed)

Natas 18 -- Predictable Session ID

Natas 19 -- Predictable Session ID (2)

Natas 20 -- Custom SESSID Logic Vulnerability

Natas 21 -- Cross Domain Cookie


Natas 22 -- Don't Follow Redirect
Natas 23 -- String/Integer Comparison

Natas 24 -- strcmp bypass
Natas 25 -- Log poison -> LFI -> RCE

Natas 26 -- Deserialization Attack


Natas 27 -- Whitespace Injection

Natas 28 -- PKCS#7


Natas 29 -- Perl RCE

Natas 30 -- Perl quote

Natas 31 -- ARGV is evil, LFI


Natas 32 -- ARGV is evil, RCE

Natas 33 -- phar:// deserialization



Credentials
User
Password
Last updated