Skip to content

Latest commit

 

History

History
29 lines (28 loc) · 974 Bytes

stages.md

File metadata and controls

29 lines (28 loc) · 974 Bytes

level01

  1. Check file with info about users
cat /etc/passwd
  1. Every user here have it's password stored in /etc/shadow (x character means it), but user flag01 stores its password here
...
flag00:x:3000:3000::/home/flag/flag00:/bin/bash
flag01:42hDRfypTqqnw:3001:3001::/home/flag/flag01:/bin/bash
flag02:x:3002:3002::/home/flag/flag02:/bin/bash
...
  1. 42hDRfypTqqnw not applies as password for flag01. Maybe it's encrypted.
  2. (On outer Linux/MacOS host) Let's copy string with ecrypted password from VM's /etc/passwds to file pwd_tmp
  3. (On outer Linux/MacOS host) Install John program and use it
john ./pwd_tmp --show
  1. John cracked this password: abcdefg
  2. Go to flag01 user and get flag:
su flag01
getflag
  1. Flag for level02: f2av5il02puano7naaf6adaaf