Nebula level08

http://exploit-exercises.com/nebula/level08

World readable files strike again. Check what that user was up to, and use it to log into flag08 account.

To do this level, log in as the level08 account with the password level08 . Files for this level can be found in /home/flag08.

The initial hint isn’t very useful, that being said let’s jump straight into /home/flag08:

$ cd /home/flag08

$ ls

capture.pcap

Ok, pcap, so we have to deal with network dump.

I think the best is to use wireshark, It is very clear when we click the Fllow the tcp stream.I also find tcpick is also a very great tool.

Upon executing tcpdump -qns 0 -A -r capture.pcap you’ll receive quite readable output but alas I couldn’t figure this out with only tcpdump.

Here I should probably mention that I cheated in this challenge, namely I did install additional package for analysing network dumps – tcpick.

With tcpick it was really quick.

$ tcpick -yP -C -r capture.pcap
(...)
Password:
b
a
c
k
d
o
o
r
.
.
.
0
0
R
m
8
.
a
t
e

.
.
.
Login incorrect
(...)

So we see characters typed as password. If you just try to type them after su flag08 it will fail, however it’s easy to see why: “.” characters between strings are backspaces so valid password is “backd00Rmate”.   I think we must see the Hex value 7f , then we can say it is DEL, of course, if you are sentive, you could easily guess it!

$ su flag08
sh-4.2$ /bin/getflag
You have successfully executed getflag on a target account

Lastly I would be glad if anyone could enlighten me how to solve this challenge with tcpdump.


  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值