level08 - nebula
World readable files strike again. Check what that user was up to, and use it to log into flag08 account.
To do this level, log in as the level08 account with the password level08. Files for this level can be found in /home/flag08.
sh-4.2$ ls
capture.pcap
We can view this pcap file with wireshark.
scp -P 22 level08@192.168.56.102:/home/flag08/capture.pcap ./
sudo wireshark capture.pcap
To get a better view we can navigate to Analyze > Follow > TCP Stream
. This shows us the entire conversation as ASCII.
..%..%..&..... ..#..'..$..&..... ..#..'..$.. .....#.....'........... .38400,38400....#.SodaCan:0....'..DISPLAY.SodaCan:0......xterm.........."........!........"..".....b........b.... B.
..............................1.......!.."......"......!..........."........".."............. ..
.....................
Linux 2.6.38-8-generic-pae (::ffff:10.1.1.2) (pts/10)
..wwwbugs login: l.le.ev.ve.el.l8.8
..
Password: backdoor...00Rm8.ate
.
..
Login incorrect
wwwbugs login:
At first glance I assumed that the flag08 password was backdoor...00Rm8.ate
but this didn’t work. The hex for .
is 7f
which in decimal is 127
which in ASCII is the delete character. This means the password is actually backd00Rmate
. Embarrassingly this was the only challenge so far I couldn’t solve on my own.
sh-4.2$ su flag08
Password:
sh-4.2$ whoami
flag08