rtmoran.org — Cybersecurity and Linux Resource

OverTheWire Leviathan – Level 3

overthewire

Again, by reviewing the dynamic library calls of the SETUID ELF, level3, found within user leviathan3‘s home directory, we can observe another strcmp() call comparing the inputted password to the accepted value.

@rtmoran.org

leviathan4 : vuH0coox6m

Leave a Reply

Your email address will not be published. Required fields are marked *