I had a twitter follower recently inform me that OverTheWire had a new wargame up and running. I was immediately excited and downloaded it. Several days later, I actually was able to start tinkering with it.
I booted up the image, and proceeded to do some preliminary nmap scans. I found a few services runinng:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Based on the clue on the Monxla page, “Hint: how big is the page you are looking at?”, I connected to the webserver.
It looked like a fairly generic page, but I viewed the source, and found a huge amount of text commented out. Since it was all alpha-numeric other than ending with a single “=”, I figured it was probably Base64.
I copied the text into a new file on my machine. I then decoded it and found out what type of file it was:
1 2 3 4
When the PDF (available here) is then opened, it shows a report of running services that may need attacked. This is similar to “levels” in most wargames, I believe (I haven’t yet finished this wargame).
My next article in this series will show how to exploit the “Bookmarks Service”.