Site: http://overthewire.org/wargames/natas/
Level: 0-7
Situation: Basic Web

These challenges will be simple at first. I will try to make to make it as detailed as i can but some challenges might prevent it.

Natas 0


This challenge is simple enough all that is required is to view the source of the site. Using our favorite browser we just right click and view source.

<div id="content">
You can find the password for the next level on this page.

<!--The password for natas1 is [OMITTED] -->
</div>

Natas 1


Same as natas0 we need to get past the little issue of not being able to right click. To bypass this all we need to do is either use the view source hotkey or menu.

<div id="content">
You can find the password for the
next level on this page, but rightclicking has been blocked!

<!--The password for natas2 is [OMITTED] -->
</div>

Natas 2


We view the source and the password isn’t there however we see it includes a file called “pixel.png” in the image source. If directory listing is enabled in the apache config we should see what is in that directory.

Embeded FullSize

If we look in users.txt we find our password.

# username:password
alice:BYNdCesZqW
bob:jw2ueICLvT
charlie:G5vCxkVV3m
natas3: [OMITTED]
eve:zo4mJWyNj2
mallory:9urtcpzBmH

Natas 3


As before we start by viewing the source and we are presented by a message that says “Not even google will find it this time”. For those who are familiar with how google spiders or web spiders in general work they look on the root address for a robots.txt. Robots.txt contains a set of “rules” so to speak for spiders to follow. This can include omitting directories. So let’s go to the “address/robots.txt”.

Embeded FullSize

We see a disallowed “secret” directory if we go in there we find a users.txt. With the following contents.

natas4:[OMITTED]

Natas 4


Once we are inside natas 5 we are presented with the following message.

Access disallowed. You are visiting from "" while authorized users should come only from "http://natas5.natas.labs.overthewire.org/"

When we click the refresh button it changes to the following.

Access disallowed. You are visiting from "http://natas4.natas.labs.overthewire.org/" while authorized users should come only from "http://natas5.natas.labs.overthewire.org/"

We can tell that it is using our html headers to see where our src is coming from. We can get past this by simply changing our Referrer header that is sent with our request. There are a few ways to do this one can do it with burp suite etc. For us we will simply install a chrome plugin called “Referrer Control” and add a rule.

Embeded FullSize

After adding the rule we refresh our page and we are given the following.

Access granted. The password for natas5 is [OMITTED]

.

Natas 5


Natas5 presents us with.

Access disallowed. You are not logged in

If we view our source its empty and we aren’t aware of it checking for any referrer URL however. If we look as our resources tab in the built in debugger. We notice that the site is setting a cookie called “loggedin” and its set to 0. If this is a boolean check 0 = false and 1 = true. So we are going to modify this cookie. Yet again there are ways to do this but to keep it all in our browser. We install a plugin called “EditOurCookie” and we use it to change the value.

Embeded FullSize

After we set the value and apply, we refresh the screen and we are given the following.

Access granted. The password for natas6 is [OMITTED]

Natas 6


We are presented with an “input secret form” and when we enter garbage data we can see that it does indeed do a post and tells us we have the wrong secret. So to gain more information we click view the source and find the following.

<?
    include "includes/secret.inc";
    if(array_key_exists("submit", $_POST)) {
        if($secret == $_POST['secret']) {
        print "Access granted. The password for natas7 is <censored>";
    } else {
        print "Wrong secret";
    }
    }
?>

We can see that it is pulling the $secret from a include file. Now if we aren’t forbidden from accessing the file we can get our string so navigate to “address”+/includes/secret.inc.

We are presented with the following.

<?
$secret = "FOEIUWGHFEEUHOFUOIU";
?>

After entering the secret key into the form. We get the next message.

Access granted. The password for natas7 is [OMITTED]

Natas 7


We start like we usually do and check the source we are immediately presented with the following message.

<!-- hint: password for webuser natas8 is in /etc/natas_webpass/natas8 -->

Telling us we will have to access the local file system somehow. What we do however is have two links “Home” and “About”. Home turns our URL to this.

index.php?page=home

About changes it to the following.

index.php?page=about

When changes to a random file we get the following.

Warning: include(asdf): failed to open stream: No such file or directory in /var/www/natas/natas7/index.php on line 21

Warning: include(): Failed opening 'asdf' for inclusion (include_path='.:/usr/share/php:/usr/share/pear') in /var/www/natas/natas7/index.php on line 21

The following line tells us that we are trying to include a file called “asdf”. This is a local file inclusion vulnerability.

Warning: include(asdf):

If we change it to the following.

index.php?page=/etc/natas_webpass/natas8

We are presented with the password.


r4stl1n

Network Security and Programming words.