OK, firstly i’m no from england or states, be soft with my english.
I’m in the main level 10, i already look many time the source code ( i didn’t read username 1by 1 ^^ ) and i also inspect all element around the emplacement for the user and password. Well i found something : te******xt like this ( i hope u get what i’m talking about ). And i already tried to used it as in main lvl … 8, ithink, u know with binary code. but no way, i looked other threads and i conclued i wasn’t in the good path.
I’m 90% sure than this information is a step to resolve this level.
In this moment i get 2 problems : - what the fukk can i do with this !
- I’m afraid about everyone talking about hash or cryt cause i never crypt anything.
If someone could give me a clue or explain me what i need to understand this level, it could be nice
Thx
View some similar previous levels. Do not afraid about crypt and hash you don’t must afraid to learn.
?
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ‘\’‘ at line 1
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ‘\’‘ at line 1
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ‘\’‘ at line 1
I think you’re trying to do something with the textfile from another exercise.
It’s a similar job, but it has its own file.
Ctrl+F is your friend!
The file you need starts with lower “L” (l*************t)
–
I could be you.
@Profuzion Don’t you think that those numbers ans letters are useful ? Maybe try to learn what those numbers and letters are.
@Profuzion normally when you break in a web server and dump the user and password table, this kind of data is that you get.
It’s not the last step, It’s time to recognize it and find how does it work.
Does the server save your password in plaintext? I hope it doesn’t because if it does any admin could read all the passwords of the web users!
Now it’s your time to dig. You’re on the good way.
–
I could be you.