⚠️There's a newer version (11.3.5.101) of this package.Take me there.

Password: Yasdl.com

$ gobuster dir -u http://yasdl.com -w /usr/share/wordlists/dirb/common.txt -x php,txt,html Result highlights:

$ gobuster dir -u http://yasdl.com/admin/ -w /usr/share/wordlists/dirb/common.txt -x txt,php,conf,json Output of interest: yasdl.com password

$ curl -X POST -d "flag=YASDLp4ssw0rd_1s_h3r3" http://yasdl.com/submit.php The server replies: $ gobuster dir -u http://yasdl

/admin/ /private/ /backup/ /login.php (the link we already saw) A quick directory brute‑force with gobuster (or dirsearch , dirb , etc.) helps confirm what’s actually reachable. yasdl.com password

/admin/.passwd (200) [size: 42] /admin/.htaccess (200) Fetching the hidden file:

<!-- the password is stored in a hidden file --> That tells us to keep looking for a hidden file. We brute‑force for hidden files inside the admin directory:

Copy Link

Version

Install

install.packages('mstrio')

Monthly Downloads

110

Version

10.11.1

License

Apache License 2.0 | file LICENSE

Maintainer

Scott Rigney

Last Published

September 14th, 2018