pickle_Pickle Rick CTF撰写

pickle

This writeup documents my approach to solving the “Pickle Rick” Capture The Flag (CTF) room available on the TryHackMe platform for free to members. The TryHackMe platform is an excellent place to learn new skills and have fun playing CTF’s! I have provided a link to the TryHackMe platform in the references below. So with that out of the way, let’s jump in to the writeup.

此文章记录了我解决TryHackMe平台上免费提供给会员的“ Pickle Rick” Capture The Flag(CTF)室的方法。 TryHackMe平台是学习新技能并玩CTF的好地方! 我在下面的参考资料中提供了到TryHackMe平台的链接。 因此,让我们继续进行写作。

免责声明 (Disclaimer)

I like to add a brief disclaimer before a writeup to encourage people to attempt the room before reading this article. There will obviously be spoilers in this writeup and I believe you will get more satisfaction from completing the CTF yourself! If you get stuck or you are not sure how to proceed, then I would advise the following:

我喜欢在撰写文章前添加简短的免责声明,以鼓励人们在阅读本文之前尝试一下。 在这篇文章中显然会有剧透,我相信您自己完成CTF会获得更多的满意! 如果您被卡住或不确定如何进行操作,那么我建议您:

  • Use multiple tools when enumerating the target machine.

    枚举目标计算机时,请使用多个工具。
  • Consider common methods used to escalate privileges.

    考虑用于升级特权的常用方法。
  • Be patient and take regular breaks. You may notice something you didn’t see before with a fresh pair of eyes!

    要有耐心,并定期休息。 您可能会发现有一双新鲜的眼睛从未见过的东西!

背景 (Background)

The theme of this CTF challenge is based on the Rick and Morty TV show. Unfortunately, Rick has been transformed into a pickle and it is up to us to turn him back to his original human form! To accomplish this, we must find 3 ingredients and make a potion 🧪!

此CTF挑战的主题基于Rick and Morty电视节目。 不幸的是,里克已经变成了泡菜,我们有责任将他变回原来的人类形态! 要做到这一点,我们必须找到3种成分并制成药水🧪!

The requirements of this CTF is to exploit a web server and find these 3 ingredients (flags). For this writeup, I will be using Kali Linux and some tools that come pre-installed with it. I will begin this writeup after connecting to the target machine. With the background for the CTF out of the way, let’s move on to the writeup.

该CTF的要求是利用Web服务器并找到这3个要素(标志)。 对于本文,我将使用Kali Linux及其预装的一些工具。 连接到目标计算机后,我将开始此编写。 在不使用CTF的背景的情况下,让我们继续进行编写。

枚举 (Enumeration)

I started of by scanning the target web server with a tool called NMAP.

我首先使用称为NMAP的工具扫描目标Web服务器。

Image for post

The NMAP command can be broken down as follows:

NMAP命令可以细分如下:

  • -Pn: Disables host discovery.

    -Pn :禁用主机发现。

  • -sV: Performs version detection for the services.

    -sV :执行服务的版本检测。

  • -sC: Performs a script scan using default scripts available in NMAP.

    -sC :使用NMAP中可用的默认脚本执行脚本扫描。

  • -v: Provides verbose details about the NMAP scan.

    -v :提供有关NMAP扫描的详细信息。

  • -oN: Outputs scan results to a file.

    -oN :将扫描结果输出到文件。

This scan identified port 22 and port 80 open on the web server.

该扫描确定了Web服

  • 0
    点赞
  • 1
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值