首页 > 其他分享 >HackMyVm-venus(1-20)

HackMyVm-venus(1-20)

时间:2024-02-22 13:34:36浏览次数:17  
标签:################ txt 20 ## HackMyVm EN venus password

HackMyVm - venus(1-20)

0x01 隐藏文件查找

################
# MISSION 0x01 #
################

## EN ##
User sophia has saved her password in a hidden file in this folder. Find it and log in as sophia.
hacker@venus:~$ ls -al
total 44
drwxr-x--- 1 root   hacker 4096 Jul 26  2023 .
drwxr-xr-x 1 root   root   4096 Jul 26  2023 ..
-rw-r----- 1 root   hacker   31 Jul 26  2023 ...
-rw-r--r-- 1 hacker hacker  220 Apr 23  2023 .bash_logout
-rw-r--r-- 1 hacker hacker 3621 Aug 10  2023 .bashrc
-rw-r----- 1 root   hacker   16 Jul 26  2023 .myhiddenpazz
-rw-r--r-- 1 hacker hacker  807 Apr 23  2023 .profile
-rw-r----- 1 root   hacker  287 Jul 26  2023 mission.txt
-rw-r----- 1 root   hacker 2542 Jul 26  2023 readme.txt

查看隐藏文件

hacker@venus:~$ cat .myhiddenpazz
Y1o645M3mR84ejc

切换到sophia用户

hacker@venus:~$ su - sophia

0x02 根据文件名寻找文件

################
# MISSION 0x02 #
################

## EN ##
The user angela has saved her password in a file but she does not remember where ... she only remembers that the file was called whereismypazz.txt
sophia@venus:~$ whereis whereismypazz.txt
whereismypazz.txt: /usr/share/whereismypazz.txt
sophia@venus:~$ cat /usr/share/whereismypazz.txt
oh5p9gAABugHBje

0x03 指定行查询

################
# MISSION 0x03 #
################

## EN ##
The password of the user emma is in line 4069 of the file findme.txt
angela@venus:~$ sed -n '4069p' findme.txt
fIvltaGaq0OUH8O

找到文件的第4069行

0x04 读取文件名是-的文件

################
# MISSION 0x04 #
################

## EN ##
User mia has left her password in the file -.
emma@venus:~$ cat ./-
iKXIYg0pyEH2Hos

0x05 查找文件夹

################
# MISSION 0x05 #
################

## EN ##
It seems that the user camila has left her password inside a folder called hereiam
mia@venus:~$ find / -type d -name hereiam 2>/dev/null
/opt/hereiam
mia@venus:~$ ls /opt/hereiam -al
total 12
drwxr-xr-x 2 root root 4096 Jul 26  2023 .
drwxr-xr-x 1 root root 4096 Jul 26  2023 ..
-rw-r--r-- 1 root root   16 Jul 26  2023 .here
mia@venus:~$ cat /opt/hereiam/.here
F67aDmCAAgOOaOc

0x06 根据文件类型查找

################
# MISSION 0x06 #
################

## EN ##
The user luna has left her password in a file inside the muack folder.
camila@venus:~$ ls
flagz.txt  mission.txt  muack
camila@venus:~/muack$ find ./ -type f 2>/dev/null
./111/111/muack
camila@venus:~$ cat muack/111/111/muack
j3vkuoKQwvbhkMc

0x07 根据文件大小查找

################
# MISSION 0x07 #
################

## EN ##
The user eleanor has left her password in a file that occupies 6969 bytes.
luna@venus:~$ find / -type f -size 6969c 2>/dev/null
/usr/share/moon.txt
luna@venus:~$ cat /usr/share/moon.txt
UNDchvln6Bmtu7b

0x08 根据所有者查找

################
# MISSION 0x08 #
################

## EN ##
The user victoria has left her password in a file in which the owner is the user violin.
eleanor@venus:~$ find / -user violin 2>/dev/null
/usr/local/games/yo
eleanor@venus:~$ cat /usr/local/games/yo
pz8OqvJBFxH0cSj

0x09 解压缩包

################
# MISSION 0x09 #
################

## EN ##
The user isla has left her password in a zip file.
-p 与-c参数类似,会将解压缩的结果显示到屏幕上,但不会执行任何的转换;
victoria@venus:~$ unzip -p pass*
D3XTob0FUImsoBb
还可以解压到tmp进行查看

0x10 查找指定开头行

################
# MISSION 0x10 #
################

## EN ##
The password of the user violet is in the line that begins with a9HFX (these 5 characters are not part of her password.).
isla@venus:~$ grep '^a9HFX' passy
a9HFXWKINVzNQLKLDVAc

0x11 查找指定结尾行

################
# MISSION 0x11 #
################

## EN ##
The password of the user lucy is in the line that ends with 0JuAZ (these last 5 characters are not part of her password
violet@venus:~$ grep '0JuAZ$' end
OCmMUjebG53giud0JuAZ

0x12 指定开有结尾查找字符

################
# MISSION 0x12 #
################

## EN ##
The password of the user elena is between the characters fu and ck
lucy@venus:~$ egrep 'fu(.*)ck' file.yo
fu4xZ5lIKYmfPLg9tck
lucy@venus:~$ grep '^fu.*ck$' file.yo
fu4xZ5lIKYmfPLg9tck

0x13 查看环境变量

################
# MISSION 0x13 #
################

## EN ##
The user alice has her password is in an environment variable.
elena@venus:~$ env | grep PASS
PASS=Cgecy2MY2MWbaqt

printenvexport

0x14 查看passwd文件

################
# MISSION 0x14 #
################

## EN ##
The admin has left the password of the user anna as a comment in the file passwd.
alice@venus:~$ cat /etc/passwd | grep 'alice'
alice:x:1014:1014:w8NvY27qkpdePox:/pwned/alice:/bin/bash

0x15 sudo无密码提权

################
# MISSION 0x15 #
################

## EN ##
Maybe sudo can help you to be natalia.
anna@venus:~$ sudo -l
Matching Defaults entries for anna on venus:
    env_reset, mail_badpass, secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin, use_pty

User anna may run the following commands on venus:
    (natalia) NOPASSWD: /bin/bash
anna@venus:~$ sudo -u natalia -i
-i 得到一个交互式shell

0x16 base64解码

################
# MISSION 0x16 #
################

## EN ##
The password of user eva is encoded in the base64.txt file
natalia@venus:~$ cat base64.txt | base64 -d
upsCA3UFu10fDAO

0x17按修改时间查找文件

################
# MISSION 0x17 #
################

## EN ##
The password of the clara user is found in a file modified on May 1, 1968.
-mtime<24小时数>:查找在指定时间曾被更改过的文件或目录,单位以24小时计算;
计算出天数是19000多天
eva@venus:~$ find / -mtime +19000 2>/dev/null
/usr/lib/cmdo

0x18 压缩包爆破

################
# MISSION 0x18 #
################

## EN ##
The password of user frida is in the password-protected zip (rockyou.txt can help you)
clara@venus:~$ base64 protected.zip
UEsDBAoACQAAAMFG+lZzdJ8jHAAAABAAAAAZABwAcHduZWQvY2xhcmEvcHJvdGVjdGVkLnR4dFVU
CQADKd/AZCnfwGR1eAsAAQQAAAAABAAAAAA1p/4kJie4z6wyYuU5N9W7cQ5FIJb5UGmHTrylUEsH
CHN0nyMcAAAAEAAAAFBLAQIeAwoACQAAAMFG+lZzdJ8jHAAAABAAAAAZABgAAAAAAAEAAACkgQAA
AABwd25lZC9jbGFyYS9wcm90ZWN0ZWQudHh0VVQFAAMp38BkdXgLAAEEAAAAAAQAAAAAUEsFBgAA
AAABAAEAXwAAAH8AAAAAAA==

得到base64,保存到本地,进行爆破

密码是pass123
clara@venus:~$ unzip -p protected.zip
[protected.zip] pwned/clara/protected.txt password:
Ed4ErEUJEaMcXli

0x19 查找重复行

################
# MISSION 0x19 #
################

## EN ##
The password of eliza is the only string that is repeated (unsorted) in repeated.txt.
frida@venus:~$ uniq -d repeated.txt
eb5467ab16852b1
Fg6b6aoksceQqB9

-d 参数显示重复行

0x20 SSH密钥登录

################
# MISSION 0x20 #
################

## EN ##
The user iris has left me her key.
eliza@venus:~$ ls -al
total 36
drwxr-x--- 2 root  eliza 4096 Jul 26  2023 .
drwxr-xr-x 1 root  root  4096 Jul 26  2023 ..
-rw-r--r-- 1 eliza eliza  220 Apr 23  2023 .bash_logout
-rw-r--r-- 1 eliza eliza 3526 Apr 23  2023 .bashrc
-rw-r----- 1 root  eliza 2602 Jul 26  2023 .iris_key
-rw-r--r-- 1 eliza eliza  807 Apr 23  2023 .profile
-rw-r----- 1 root  eliza   31 Jul 26  2023 flagz.txt
-rw-r----- 1 root  eliza  143 Jul 26  2023 mission.txt
eliza@venus:~$ ssh -i .iris_key iris@localhost

标签:################,txt,20,##,HackMyVm,EN,venus,password
From: https://www.cnblogs.com/C0rr3ct/p/18027122

相关文章

  • dp 学习笔记 (2024/2/22 - )
    计数[ARC107D]NumberofMultisets[ARC104D]MultisetMean大值域限制偏序计数[CF1295F]GoodContest[ARC104E]RandomLIS......
  • 【专题】2023年全球移动应用(非游戏)营销趋势白皮书报告PDF合集分享(附原数据表)
    原文链接:https://tecdat.cn/?p=35180原文出处:拓端数据部落公众号随着国内政策调整,移动APP业务前景充满不确定性,但这也为出海应用带来了新机遇。2023年,AI和短剧应用的崛起为出海行业注入了信心。随着用户需求增长和技术进步,这两个领域有望在2024年迎来更大发展。阅读原文,获取专......
  • 2024初三集训模拟测试4
    2024初三集训模拟测试4\(T1\)打赌\(0pts\)\(T2\)舞会\(0pts\)\(T3\)最小生成树\(0pts\)经打表,有最小生成树的边权和为\(n-1\),构造每条边上的两端点互质即可。故\(\prod\limits_{i=1}^{n}\varphi(i)\)即为所求。点击查看代码constllp=100000007;llph......
  • 2024初三集训模拟测试4
    T1打赌简单题,模拟一下即可。T2舞会小贪心,尽量找离自己最近的防止后面的不能找。T3最小生成树显然权值和为\(n-1\),就是连互质的数,然后要求父亲小于儿子,所以欧拉函数一乘即可。T4买汽水正解是分成两组后搜索加剪枝,随机化也能过,数据很水。......
  • 墨天轮2023年度数据库获奖名单
    随着数字化转型深入推进和数据量的爆炸式增长,千行百业应用对数据库的需求变化推动数据库技术加速创新,全球数据库产业快速发展,我国已迈入第一梯队。2023年国产数据库在技术创新、市场竞争和国际合作等方面取得了显著的成就,展现出振奋人心的发展态势。墨天轮数据社区以近50个客观中......
  • 为免费Hyper-V Server 2019打造本地图形管理界面
    Hyper-VServer是微软发布的免费虚拟化引擎,支持文本界面。本文通过在Hyper-VServer上本地安装chrome和windowsadmincenter,实现Hyper-VServer的本地图形管理界面。1、介绍Hyper-V是Microsoft的硬件虚拟化产品。它用于创建并运行计算机的软件版本,称为“虚拟机”。每......
  • 2024.02《高效学习法》
     背口诀、划重点、反复温习……各种方法都试过了,可为什么学习成绩还是没有提高呢?其实,你不是不会学习,而是不知道正确的学习方法!日本学习之神DaiGo公开自己独创并长年使用、科学有效、实践性极高的学习秘籍:想象自己把学习内容输出到10岁的孩子都能听懂、不写学习目标而写你掌......
  • 2023年总结
    2023年:1.工作在狗东,晋升T8级别。2.在技术架构团队,一直在一线。3.输出了5+个工具或者框架,交易团队多少都有在用,输出文档N篇,内网居多,再也没有用一周写一遍像样的文章了(比较忙)。4.大部分业余时间贡献给了中医(线上性能调优搞的有点麻木了,想冲击一下人类最高智慧,颇难,2023共看了......
  • [洛谷P3503][POI2010][BZOI2086]Blocks
    先看数据范围,n≤1e7,k≤1e9,暴力显然行不通,只能考虑单调栈;首先题目中说每一个数都要大于k,那么我们可以在初始化时就将每一个数都减去k,将问题转化为从正数中取出数加到负数里;然后维护一个前缀和,来判断一个区间是否符合要求;显然,当sum[j]-sum[i]≥0时,区间[i+1,j]符合题意,......
  • AutoCAD2024画圆或矩形实时预览消失了如何解决?
    最近有小伙伴问这个问题,他在使用AutoCAD绘制图形时,发现画圆或矩形实时预览没有了,如下,画图不容易定位,非常影响画图效率,十分苦恼不知道如何恢复? 正常CAD画圆(或矩形)会显示实时预览,如下:操作步骤:AutoCAD20241、打开AutoCAD2024软件,然后在命令栏输入:DRAGMODE,然后按Enter键......