HACKERTEST.NET | Level 8: Need a PSD

After the first few easy levels these missions tend to get really hard and good. In our last level we learned about stenography you can read more about it on Wikipedia, its always good to learn more.

Level 8 seems to be a bit difficult in the beginning, but you can always start with the basic steps and follow the further clues. If we check the source code for this mission their is nothing much you will find there except this.

Continue reading “HACKERTEST.NET | Level 8: Need a PSD”

HACKERTEST.NET | Level 7: Included. Where?

Checking the source code has become our usual practice now. But it doesn’t seem to do any good in this level in the beginning but later you will find that level 7 is really easy, only a look at the right place is needed.

There is a little clue given to us by the coders of hackertest.net in the name of the file we are on i.e. included.htm, so one may consider searching for some include statement or tags. Soon you find an image file included in the body tag.

Continue reading “HACKERTEST.NET | Level 7: Included. Where?”

HACKERTEST.NET | Level 6: Linking javascript

Tired of prompts? Lets solve this one quickly and move to next mission. When you check the source code for his mission you will not find a function like the previous levels. It is because the we necessarily do not need to write the javascript codes in our main file. We can also write it in a separate js file and link it.

<SCRIPT SRC="psswd.js" LANGUAGE="JavaScript" type="text/javascript"></script>

Like its done here. The javascript function is written in a separate psswd.js file. So lets just open this file using directory traversal and move on.

Continue reading “HACKERTEST.NET | Level 6: Linking javascript”

HACKERTEST.NET | Level 5: SAvE-as

After solving the previous levels with javascript prompt level 5 isn’t difficult to solve. Some of you might face problems in it because if you click cancel the page redirects itself, giving you no time to check out the source code.

But if you are using Firefox (no idea about other browsers) you can still check the source code by pressing ctrl+U while the page is loading. Just open the source code and you’ll get the answer.

var pass, i;
pass=prompt("Password: ","");
if (pass=="SAvE-as hELpS a lOt") {
window.location.href="save_as.htm";
i=4;
}else {alert("Try again");
window.location.href="abrae.htm";}


The password is SAvE-as hELpS a lOt.

Continue reading “HACKERTEST.NET | Level 5: SAvE-as”