Details
This is a writeup for the basic missions from http://hackthissite.org/
Basic One
The hint for this task caused me to think of the html source as this is a common entry level task
Within the html source I was able to find the password
915491ce
I then used this to login
Basic Two
Here I thought, if it was simply comparing two strings and one was missing, if it didn't crash it would be comparing to a blank string. So I submitted an empty password
Basic Three
I started by checking the source code, where I found a link to /password.php
So I went to https://www.hackthissite.org/missions/basic/3/password.php
Now with a password
f2cfef6f
I used it to login
Basic Four
Upon inspecting the source code I found the email was set in the html
I then changed the email to my own email and clicked the button to send the it. When I checked my email I had the password
9c64d2ca
Using this to login
Basic Five
This looked similar to the last one, so I repeated the process
8226d544
Then I logged in
Basic Six
On this task I carried out a bit of trial and error, and deduced that the encryption merely added the 0-indexed position of the character, to the characters ASCII code, as such I could reverse it by subtracting that value. Which led to the password
419e23e3
Basic Seven
This looked like an easy command injection based on the hint, so I submitted
; ls -la
I then navigated to https://www.hackthissite.org/missions/basic/7/k1kh31b1n55h.php to get the password
c25f39a1
Using this I progressed to the next level
Basic Eight
To started with I entered "test"
I then clicked on "here"
In this file I noticed the extension was .shtml which meant I may be able to inject a server side include to find the password. So I injected
<!-- #exec cmd="ls ../" -->
I then navigated to https://www.hackthissite.org/missions/basic/8/au12ha39vc.php
c5e6ee66
Using this I logged in again
Basic Nine
To do this, I went back to level 8 and injected
<!--#exec cmd="ls ../../9" -->
Using directory traversal to get the location of the password
To get the password I went to https://www.hackthissite.org/missions/basic/9/p91e283zc3.php
bb52929d
Which led to
Basic Ten
I tried looking around, then a random password. When I noticed in the response there was a cookie, upon inspection it seemed the cookie was used for auth
I set the value to "yes" then tried another random password
Basic Eleven
I found the on every load the name of the song changed. To start I tried to access .htaccess but could not. I then tried /index.php
Now knowing where to put the password once I had it. I began to dig some more, trying some directories, I then found /e
I followed the directories down to https://www.hackthissite.org/missions/basic/11/e/l/t/o/n/ which was blank, I then tried .htaccess again
This led me to going to https://www.hackthissite.org/missions/basic/11/e/l/t/o/n/DaAnswer
I tried looking for some more files to do with it, but found nothing. So I decided to take the hint literally and try "available" as the password
And that was basic 11 done and with that, all the basic missions