What is it? @.@

Here is the place where I record some tactics about wargame, systems, and other security issues.

2012-11-11

TRY2HACK - Level 6

Description:

LEVEL 6

To pass this level, download this Visual Basic 6.0 program and enter the correct username/password to proceed to the next level.

Solution :
  1. Download the file first, and we have to unzip it before we can use it.
    Link:
    http://www.try2hack.nl/levels/level6.zip

    File list :
    LEVEL6.TXT, LEVEL6.EXE
  2. Before we execute LEVEL6.EXE, we maybe need VB 6.0 runtime dll and other OLE Control eXtension files.
    Here are some useful links :
    [Tool]
    http://vbdis4.angelfire.com/
    http://www.microsoft.com/en-us/download/details.aspx?id=5721
    http://support.microsoft.com/kb/192461
    [MSWINSCK.OCX]
    http://www.ocxdump.com/ocxfiles/M/MSWINSCK.OCX
    [RICHTX32.OCX]
    http://www.ocxdump.com/ocxfiles/R/RICHTX32.OCX
  3. The successful execution is like below.
  4. If we enter any username/password for testing, the application will connect server back to check authentication.


  5. From the HTTP packet content, we knew the true username, password and page for next level are encrypted with 'Bacon's cipher'.
    Wikipedia: http://en.wikipedia.org/wiki/Bacon's_cipher
    a   AAAAA   g     AABBA   n    ABBAA   t     BAABA
    b   AAAAB   h     AABBB   o    ABBAB   u-v   BAABB
    c   AAABA   i-j   ABAAA   p    ABBBA   w     BABAA
    d   AAABB   k     ABAAB   q    ABBBB   x     BABAB
    e   AABAA   l     ABABA   r    BAAAA   y     BABBA
    f   AABAB   m     ABABB   s    BAAAB   z     BABBB
  6. After we decrypted the username and password, it will show us the URL for nex level.
    username : dabomb
    password : encryptionrawks
    url : http://www.try2hack.nl/levels/level7-xfkohc.php

  7. It's done!!

4 comments:

  1. This comment has been removed by the author.

    ReplyDelete
    Replies
    1. ➡️MOBILE PHONE HACKING.
      ➡️BINARY FUNDS&BITCOIN RECOVERIES.

      ➡️SOCIAL MEDIA ACCOUNT&EMAIL HACKING etc....
      if you in a haste to have any of these done by seeking hackers yourselves,you will only get ripped.
      PLEASE PAY ATTENTION TO THIS ARTICLE AS YOU READ THROUGH IT.

      HOW WOULD YOU KNOW?? 

      TAKE NOTE AND PRECAUTIONS:

      1. you see uncertified email accounts carrying numberings likeiamhacklord1232@(gmail,yahoo or hotmailDOTcom)  pls flee from them, BIG SCAMMERS.

      They take your money and never do your job.

      2. you see posts like "do you need to spy on spouse?" All fake!just a way to lure you towards getting ripped!. 3, posting fake testimonies and comments to trick you into feeling safe. Pls endeavour to ignore!! 

      ➡️NOTE: beware as we urge you not to make respond to any "IVAN HONG,PETER SANTOS,MONICA HART (impersonating with our articles pretending to work under us)
      WE ONLY HAVE 2 EMAILS WHICH ARE LISTED BELOW THIS ARTICLE TO ATTEND TO ALL MANNERS OF CYBER HACKING ISSUES.

                             ◾VERY IMPORTANT ◾
      For years now, We've helped  organizations  secure data base,  so many sites USE US AS SECURITY BACK UP TEAM BECAUSE OF OUR METHODS OF  HANDLING CYBER MISHAPS. 

      "iPhone&ANDROID HACKS"

      "CLEAR CRIMINAL RECORDS"   

      "FUNDS RECOVERIES" AND LOT MORE BEEN DONE IN SHORT TIMING.
      these are significant EXPERIENCES & RECORDS a good and effectively fully recognized organization must firmly ascertain. 

                              ◾OUR AIMS HERE◾

      1◾to assign a qualified agent of specific rank to particularly any sort of cyber issues you intend dealing with in short and accurate timing.

      2◾ to screen in real hackers (gurus only) in need of job with or without a degree, to speed up the  availability of time given for Job contracts given to us.Thus an online binary decoding exam will be set for those who seeks employment under the teams Establishment.
       write us on:
      ◾Protocolhacks@gmail .com
      ◾Cybershieldnotch@gmail .com
      COREY ROD, 
      SIGNED...
      Thank you..

      Delete

  2. Do you need service of a hacker who can help you get your job done? Search no more.
    We have reputable service to get your job done without trace, speedy work recovery, guarantee non data lost, expert in handling of email hacks and remote server shutdown. We are the guru in terms of service delivery. What are you seeking or want?.

    Do you want get access to another Email, Facebook, School Grades, spy on Phone. This is our job.
    Contact us Today for speedy work and no excuses
    Our mail is (cyberfiles.hacker@gmail.com) services, also cheap and affordables.

    ReplyDelete
  3. Will be getting spy shortly. Husband has been caught red handed before, and is displaying the same affects as when he’s hiding something. He was showing me something on his phone today & 3 messages in rapid fire cane while watching the video. “Well, how am I to contact you if not via text?” Next: do you have a gmail?” Next: “Let’s talk on google hangout”. Idk of any DUDE that wants to chat on google hangout. Add the fact I caught a glimpse of a pornish pic that looked like he was in it last week, and he’s been REALLY touch about my touching his phone, which isn’t normal or necessary since I only touch it to give it to him. Well, We just had a baby, his phone cam is better and I took some pics of baby girl and got a tongue lashing because it “acted funny afterward” , so “leave my work phone alone. He swore a year ago he was done with this type shit. I told him i would be done should I catch him again. Hurts. Love him to death. Maybe literally.

    but i got the answers i seek...
    thanks to

    onlinehacker4hire at gmail dot com

    ReplyDelete