by InCIDRthreat | Apr 29, 2019 | hacking, tutorials
Welcome back! Now that we’ve conquered Level 2 and gained the password for Level 3 it’s time to keep pressing. Introduction Same thing from before. Log into the lab server as Narnia3 and look at the source code for narnia3.c. /* This program is free...
by InCIDRthreat | Apr 24, 2019 | hacking, tutorials
Introduction In the previous write up the environment variable was set to the exploit payload granting an escalated shell. This challenge is different however, it will be building upon the theme of binary analysis. Getting Started Once logged into the Narnia server as...
by InCIDRthreat | Feb 20, 2019 | hacking, tutorials
Introduction Narnia a series of reverse engineering puzzles developed by OverTheWire and is an introduction to reverse engineering. Below is the methodology used to solve these puzzles. Login and Execution In the previous level, Narnia 0, we covered the difference...
by deadpackets | Jun 14, 2017 | hacking, security, tutorials
Disclaimer: What you do with this information is up to you. You are fully responsible for what you do with this info, and how you use it. HackMethod is not responsible for your actions. Please do not hack Wifi points that you are not allowed to. NOTE: I do advise...
by n00py | Oct 26, 2016 | overthewire, tutorials
Recap of Last Lesson: We learned more about command injection and how to exploit it. We also revisited directory traversal attacks. Natas Level 10 Objective: Find the password to log into level 11. Intel Given: URL: http://natas10.natas.labs.overthewire.org/ Source...
by InCIDRthreat | Oct 25, 2016 | hacking, technology, tutorials
Linux Unified Key Setup, or LUKS [luhks] as it will be referred to as from here on out, is a widely used method of disk-encryption. LUKS is proprietary to the Linux Kernel and a device encrypted with LUKS will not mount in a Windows or Apple environment. LUKS can...