::Hackerslab::Level5::

::Hackerslab Guides::


::Home::
::Submit::
::Hackerslab::
::Level0::
::Level1::
::Level2::
::Level3::
::Level4::
::Level5::
::Level6::
::Level7::
::HTS::
::Web 6::

Last login: Sat Feb 21 17:41:00 from 220.76.81.223
[level5@drill level5]$

::Welcome to level5 hackerslab.org tutorial::
A hacker named John made the backdoor for the first problem. He got really angry when he realized that other HackersLab members were taking his backdoor for granted. He had worked on it very hard for one day and now he thinks that he can feel rest assured thinking that no one else can use the backdoor. Drive him mad again!

Hmm, I guess we made him pretty mad. He has password protected it now. Let's piss him off!

*Step 1: The find command.(Results may vary)

[level5@drill level5]$ find / -user level6 -group level5 2>/dev/null
/lib/security/pam_auth.so
[level5@drill level5]$

*Step 2: Execute.

[level5@drill level5]$ /lib/security/pam_auth.so
passwd:

*Step 3: Hack it.

[level5@drill level5]$ strings /lib/security/pam_auth.so
/lib/ld-linux.so.2
__gmon_start__
libc.so.6
printf
execl
__cxa_finalize
getpass
sleep
__deregister_frame_info
strcmp
_IO_stdin_used
__libc_start_main
__register_frame_info
GLIBC_2.1.3
GLIBC_2.0
PTRh
QVh,
what the hell are you thinking?
abcd1234
1qaz2wsx
0plmfk3s
qkqh
fj3,n34k$^
fgjk3!mfr*
Best of The Best Hackerslab
tkfkdgo!
loveyou!
D873nmf9
apple123~
flr1234
passwd:
/bin/sh
passwd incorrect
[level5@drill level5]$

So, there is only one way to finish this level. Guess every password up there until you get the right one. When you get the wrong password, this will happen:

[level5@drill level5]$ /lib/security/pam_auth.so
passwd:
passwd incorrect
[level5@drill level5]$

When you get the right password, this will happen:

[level5@drill level5]$ /lib/security/pam_auth.so
passwd:
[level5@drill level5]$

When you get the right password, do this.

[level5@drill level5]$ pass

Congratulations!
Written by: Glitch

Site Design by: Glitch