The Perl Toolchain Summit needs more sponsors. If your company depends on Perl, please support this very important event.

NAME

natas16 - solve level 16 of overthewire.org's Natas server-side security war games

VERSION

version 0.002

SYNOPSIS

    natas16 password

DESCRIPTION

overthewire.org has a series of war games. Natas is the server-side security challenge.

Level 16 requires you to do blind shell injection. Guessing each one-character slice of a 32-character password is tedious and prone to errors if done manually, so this script automates the process. Simply provide the password for level 16 as the first argument on the command line

OPTIONS

--version

Print the version number and exit

SEE ALSO

AVAILABILITY

The project homepage is https://hashbang.ca/tag/natas.

The latest version of this module is available from the Comprehensive Perl Archive Network (CPAN). Visit http://www.perl.com/CPAN/ to find a CPAN site near you, or see https://metacpan.org/module/Hack::Natas/.

SOURCE

The development version is on github at http://github.com/doherty/Hack-Natas and may be cloned from git://github.com/doherty/Hack-Natas.git

BUGS AND LIMITATIONS

You can make new bug reports, and view existing ones, through the web interface at https://github.com/doherty/Hack-Natas/issues.

AUTHOR

Mike Doherty <doherty@cpan.org>

COPYRIGHT AND LICENSE

This software is copyright (c) 2013 by Mike Doherty.

This is free software; you can redistribute it and/or modify it under the same terms as the Perl 5 programming language system itself.