natas15 - solve level 15 of overthewire.org's Natas server-side security war games
version 0.002
natas15 password
overthewire.org has a series of war games. Natas is the server-side security challenge.
Level 15 requires you to do blind SQL injection. Guessing each one-character slice of a 32-character password is tedious and prone to errors if done manually, so this script automates the process. Simply provide the password for level 15 as the first argument on the command line
--wrong, --no-wrong
Use the wrong SQL to find the incorrect password.
This is useful as a teaching tool, to illustrate the effect of neglecting case-sensitivity in your injected SQL.
natas15 - solve level 15 of overthewire.org's Natas war games
natas16
Hack::Natas
The project homepage is https://hashbang.ca/tag/natas.
The latest version of this module is available from the Comprehensive Perl Archive Network (CPAN). Visit http://www.perl.com/CPAN/ to find a CPAN site near you, or see https://metacpan.org/module/Hack::Natas/.
The development version is on github at http://github.com/doherty/Hack-Natas and may be cloned from git://github.com/doherty/Hack-Natas.git
You can make new bug reports, and view existing ones, through the web interface at https://github.com/doherty/Hack-Natas/issues.
Mike Doherty <doherty@cpan.org>
This software is copyright (c) 2013 by Mike Doherty.
This is free software; you can redistribute it and/or modify it under the same terms as the Perl 5 programming language system itself.
To install Hack::Natas, copy and paste the appropriate command in to your terminal.
cpanm
cpanm Hack::Natas
CPAN shell
perl -MCPAN -e shell install Hack::Natas
For more information on module installation, please visit the detailed CPAN module installation guide.