Level 1
Enter the Code:
1M953EaDeTVTVg„V#EgdVx–CW‰TËœuËœt2Y‚9ùÅ*ÙÂ�B˜ô9y4Žùšß˜* Â�ËœCò˜§ðšÃ�©÷mºù{Hzß}©øiŽšzk„æø·htÅ*jHÅ*FúŸâ€*Hzyšæ’8÷ùv’8i‚5‡æ÷*oËœzWÂ�h'5’8u‚6R5Å¡S)g‰6$s%Ë œ6'6)‡5‡2ce“‚VZ‡:7g:gÅ*Xrc‡e2xV©‡5Å*ËœÅ*8v8uc)…hy2e‡&S’…c(•oËœv:—â€*š‡V–9‡ZeËœ £vY£‡jY‡i‡ZcËœvú9‡hzV‡ú–‡Fš–˜GjH–JŸ„§ö‡JUéh}oš—Å*ùi„zdËœv“S˜˜&?‰s&à ¸râ€�øy‡$‚Â�Z}õšCS)ùR‡>Yö2¹mÅ*Ÿ*xúoÃ�šõÚŸ¯)2Ëœ_IYø}¥úØöšÂ�ùd)ö9Ö_‡Å*~xÙö˜çh}¯gÅ¡Â�øÅ*æúÂ�â€*÷*÷ðšèô©IÅ¡v×úÙö}úØvú˜vùš}úö˜Of4úßšvËœGo„yÅ*øzß*úâ€�cxo*WoÂ¥vß_Úúúâ€*ø}jørú‡m‡öšvøtoxÅ*hvôhÅ*‡F‚vXs&Xv‡úh}Å*øzhth v6Hvš§j‡F‡öšvô‡Å*úg©F(f
Level 2
Too directory up (called IIS 4 exploit)
Enter '../../index' (without quotes)..Got the 'Go On' button..?
Level 3
Enter '2' (without quotes)..Got the 'Go On' button..?
Level 4
Look that user types 6,7
Enter '67' (without quotes)..Got the 'Go On' button..?
Level 5
Enter 'sed -e “s/eval/safeeval/g� tmp' (without quotes)..Got the 'Go On' button..?
level 6
Variable stored password get checked.Thus enter 'http://moo.com/me.php?passed=true' (without quotes)..Got the 'Go On' button..?
Level 7
Enter '<form name="grezvahfvfnjuvavatovgpu" action="<?=htmlspecialchars($_SERVER['PHP_SELF'])?>" method="post">' (without quotes)..Got the 'Go On' button..?
Level 8
Enter 'if ($User eq 'BillGates')' (without quotes)..Got the 'Go On' button..?
Level 9
Enter 'open(STARTREKLOG, '>>/var/log/startrek');' (without quotes)..Got the 'Go On' button..?
Level 10This is called 'Batch injection'.
pass = a"=="a" SET PASSWORDVALUE=1065435274 & GOTO :END & REM
Level 11
This is same as number 10 but we are not supposed to do so.
Enter 'aghilmort' (without quotes)..Got the 'Go On' button..?
Level 12
Enter 'moo.com/bla.php?userpass=1&password=1' (without quotes)..Got the 'Go On' button..?
Level 13
Enter 'vrfy.php?name=&email=' (without quotes)..Got the 'Go On' button..?
Level 14
Enter 'private synchronized void incrementLeetness() {'
(without quotes)..Got the 'Go On' button..?
No comments:
Post a Comment