Quote
is an indirect reference to http://www.try2hack.nl/faq/:
Quote
You assmonkey! Thanks to you I've spent the last 3 hours working on those levels! I'm at level seven and I need to rest my brain. I'm starting to see fairies dancing across the top of my monitor.
lmao! Which one is level 7? I got upto the one that was a username/password which is sent to a .pl file which contains a very well known exploit classicly. I got the .passwd file, but never got around to cracking it before they changed all their stuff around :)
In this one, I have to spoof my User_Agent and Referrer to load the php page correctly. I'm pretty sure I can do it with a telnet session to port 80 but I'm not going to mess with it anymore today. I have other fun things to do tonight. :)
Quote from: Thing on October 24, 2003, 06:47 PM
In this one, I have to spoof my User_Agent and Referrer to load the php page correctly. I'm pretty sure I can do it with a telnet session to port 80 but I'm not going to mess with it anymore today. I have other fun things to do tonight. :)
Ah yes, is that the one where it says:
Browser: failed, requires mozilla 6.72
Referer: failed, requires www.microsoft.com/support?
If so, yes, it just requires a manual HTTP request on port 80 :)
Wget can do it as well. A very nice tool it is.
--referer=URL
--user-agent=AGENT
Hehe I didn't even consider wget, even though I use it frequently. Good call Adron!
I've never heard of that, but it would simplify things a lot! Back then I didn't really know what to type, so I had a lot of lines looking like:
GET /page.html HTTP/1.1
Host: www.try2hack.nl
get /page.html http/1.1
HOST: www.try2hack.nl
etc.
Oh yea that was much easier Adron.
Quotewget --user-agent="MSIE 7.66;Unix" --referer="http://www.microsoft.com/ms.htm" http://w w w .try2hack.nl/levels/level7-xfkohc.php
/edit Level 8 completed
QuoteViewing the source of the page revealed that it was executing /cgi-bin/phf. A quick google of phf expoit and I got some goodness http://w w w.try2hack.nl/cgi-bin/phf?Qalias=%0a/bin/cat%20/etc/passwd. Viola! There is the password file. I quickly copy and paste it into a new document and run John the Ripper on it. root / arsanik Done.
Too bad level 9 is broken ... or is it ...