http://natas7.natas.labs.overthewire.org
Username: natas7
Password: (natas7_password)

The clue indicates that the password for natas8 is located at /etc/natas_webpass/natas8.

Next, we click on the Home and About pages to see if anything interesting appears.

Noticing the URL pattern index.php?page=home, we begin some online research.

A Local File Inclusion (LFI) attack happens when a website lets a user load or “include” files from the server, but doesn’t check or restrict what files can be loaded.
Next, we replace home in the URL with /etc/natas_webpass/natas8 and hit enter.

You should see the flag displayed.

For those who prefer the command line over a browser.
curl -u natas7:bmg8SvU1LizuWjx3y7xkNERkHxGre0GS \
http://natas7.natas.labs.overthewire.org/index.php?page=/etc/natas_webpass/natas8

You got the flag! Let’s see what the next challenge has in store.