-->
Vulnhub - Gameover Vm - Hackademic_Challenges - Challenge 008

Vulnhub - Gameover Vm - Hackademic_Challenges - Challenge 008

Vulnhub - Gameover Vm - Hackademic_Challenges - Challenge 008

We browse to the 008 challenge in addition to get:


JKnLpQhOOqXCkSNHkEDwdVBUAzwnbGhoSLQsWDGiuXnEhJRYgu VulnHub - GameOver vm - Hackademic_Challenges - challenge 008

- afterwards prodding around amongst nikto, in addition to dirbuster, nosotros notice goose egg except a possible vulnerability for the Santy.A worm, which Pb me off to several sites on google...
- I checked the source code in addition to establish nothing...
- reading the page, I  am given information about...

Enter 'help' for available commands.

- typing assist gives me available commands...
ls
whoami
id
help
su


- nosotros all the same demand to move source to run whatsoever commands, hence I proceeded through the list.
- nether 'ls' I larn a listing of files, such as, index.php in addition to b64.txt. I browse to the .txt file to get:

LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0NClVzZXJuYW1lO
iByb290IA0KUGFzc3dvcmQ6IGcwdHIwMHQNCi0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0
tLS0tLS0tLS0tLS0tLS0tLS0t

-  does 'b64' file elevate betoken a base64 encryption format:
--------------------------------------------
Username: source
Password: g0tr00t
--------------------------------------------

..it did :)

One needs to type 'su' first, to larn to the Login prompt inwards the site!

Another means to decrypt that would move amongst the ascendance below, replacing the base64 format amongst our long string:
echo QWxhZGRpbjpvcGVuIHNlc2FtZQ== | base64 --decode 

 Upon authentication, nosotros are greeted with:

JKnLpQhOOqXCkSNHkEDwdVBUAzwnbGhoSLQsWDGiuXnEhJRYgu VulnHub - GameOver vm - Hackademic_Challenges - challenge 008

 
Blogger
Disqus
Pilih Sistem Komentar

No comments

Advertiser