- 博客(9)
- 资源 (2)
- 收藏
- 关注
转载 Nebula: level06
exploit-exercises Nebula: level06In level06, we are told that the account credentials for flag06 user account come from a legacy unix system. Let's go straight to the bank.level06@nebula:~$
2015-02-08 09:37:26
346
转载 Nebula: level05
exploit-exercises Nebula: level05This is the write-up for level05 of Nebula wargame. We are told to check the flag05 home directory and look for weak permissions.level05@nebula:/home/flag05$
2015-02-08 09:16:52
776
转载 Nebula_Level04
http://www.kroosec.com/2012/10/nebula-level04.html exploit-exercises Nebula: level04In level04 of Nebula wargame, we are tasked to exploit flag04 binary to read a token file. The so
2015-01-29 09:29:54
373
转载 Nebula_level03
exploit-exercises Nebula: level03In level03 challenge of Nebula, we are told that there is a crontab running every couple of minutes.level03@nebula:/home/flag03$ ls -ltotal 8drwxrwxrwx 2
2015-01-29 08:00:15
414
转载 Nebula_level02
exploit-exercises Nebula: level02In level02 Nebula challenge, we have the following source code#include #include #include #include #include int main(int argc, char **argv, ch
2015-01-29 07:49:06
367
转载 Nebula_level01
http://www.kroosec.com/2012/10/nebula-level01.htmlIn level01 of Nebula wargame, we are required to find a vulnerability that allows us to run arbitrary programs. The source code of flag01 is p
2015-01-28 01:48:34
424
原创 logic.smashthestack.org_level01
Getting StartedThe first level of this game is accessible via the web here: Level 1.After finishing the first level you will need to connect to the server via ssh with the following command:
2015-01-25 00:29:02
449
原创 nebula_level00
Level00 AboutThis level requires you to find a Set User ID program that will run as the“flag00” account. You could also find this by carefully looking in top leveldirectories in / for suspicious
2015-01-24 01:21:51
327
空空如也
TA创建的收藏夹 TA关注的收藏夹
TA关注的人
RSS订阅