First day in Rust language

TL;ND : This blog includes the usage of these features:  Details: Well, practice is the best learning. Start my task in a simple coding task (in fact, it is one of my homework questions), here is the question: Across the broad range of the multiverse, there are an infinite number of universes! These universes howeverContinue reading “First day in Rust language”

natas 33-34

Username: natas33Password: Ihchno1voinhchisaieem1aingeURL:http://natas33.natas.labs.overthewire.org/ (I change the point colour into blue) Looking at the source code, we know that the server executes the uploaded file when its MD5 checksum matches adeafbadbabec0dedabada55ba55d00d. It’s easy to think of an MD5 collision, however it’s useless here because it’s limited to 4096 bytes. Looking at the front-end code, you’ll seeContinue reading “natas 33-34”

natas 27-28 mysql overflow

This level is very difficult, especially for me who doesn’t know MySQL, so I checked some information online. Username: natas27Password: N9PVzCpPZuDPVzCJ5b3BnbG6OzCJ5bURL:http://natas27.natas.labs.overthewire.org/ Checking the source code, I was trying to get the password through sql injection, but it’s hard to achieve:Firstly, the source code escapes the special characters in the input username and password with theContinue reading “natas 27-28 mysql overflow”

natas Level 24-25 strcmap()

The function is broken…. Very interesting. Username: natas24Password: OsRxSpoAduo98564TZX14z379LZvegURL:http://natas24.natas.labs.overthewire.org/ source code: The strcmp() function exists, strcmp() function’s role is to compare two strings, the same as 0. This naturally thought of strcmp vulnerability, strcmp function can not compare arrays, it will return 0, the passwd input as an array can be bypassed! Extension – strcmpContinue reading “natas Level 24-25 strcmap()”