Basic 12 - Feeling stupid
After trying 100 or so directories and file names inside the php script and from the basic12/ directory trying names that you would expect with apache auth and such. And it is using ** file protection preventing them from being served to me normally.im just kind of confused if its a guessing game or am i supposed to do a buffer overflow or cgi exploit… or brute force attack. I know it says im on the right track plugging stuff into the php script but im woundering if its just saying that to throw me off. I suck i Know… Yeah i got it thanks:) i had this stupid syntax error i kept making./
sigh - Ok, I have done it all. I have accessed the ** file, that gives a hint to the second *****d file. There, I see the ":". I tried to enter that in the protected folder pop-up, doesn't work. I have tried injecting it via the URLbar via ":*@" - also, no luck. Can someone help me who did the challenge (compare the user/pass).
Thanks in advance Ciao
@thronworld Its not a zip file, try googling for "protecting directories"
What happens when someone wants to protect a certain directory? What is created on the server, to tell it that the directory needs a username password to enter it? Where is this created?
Hope this helps?
@spyware It seems you are close, PM me what you have so far I will help you out.
Cheers
Dantronix