- SEE ALSO
- BUGS AND LIMITATIONS
- COPYRIGHT AND LICENSE
natas15 - solve level 15 of overthewire.org's Natas server-side security war games
natas15 [ password ]
overthewire.org has a series of war games. Natas is the server-side security challenge.
Level 15 requires you to do blind SQL injection. Guessing each one-character slice of a 32-character password is tedious and prone to errors if done manually, so this script automates the process. You will be prompted interactively for the password to access this level. If you prefer to run noninteractively, you can give the password as the first argument on the command line, but note that the password will be visible to other users on the system.
Prints the version number and exits.
natas15 - solve level 15 of overthewire.org's Natas war games
The project homepage is https://hashbang.ca/tag/natas.
The latest version of this module is available from the Comprehensive Perl Archive Network (CPAN). Visit http://www.perl.com/CPAN/ to find a CPAN site near you, or see https://metacpan.org/module/Hack::Natas/.
You can make new bug reports, and view existing ones, through the web interface at https://github.com/doherty/Hack-Natas/issues.
Mike Doherty <firstname.lastname@example.org>
This software is copyright (c) 2013 by Mike Doherty.
This is free software; you can redistribute it and/or modify it under the same terms as the Perl 5 programming language system itself.