title: 'Vulnhub-NOOB: 1'
tags: Vulnhub
abbrlink: 46e578d5

date: 2022-10-13 08:03:52

描述

  • Name: Noob: 1
  • Date release: 22 Sep 2021
  • Author: VIEH Group
  • Series: Noob

N/A

nmap

存活

image-20221013082523642

kali  192.168.169.220
靶机  192.168.169.232

靶机ip

image-20221013082706940

  • 21 80 55077

访问网页

image-20221013082936175

ftp

ftp 192.168.169.232        # 匿名登录  anonymous

image-20221013083745000

两文件

  • 下载本地

image-20221013084021367

  • 查看

image-20221013084059565

Y2hhbXA6cGFzc3dvcmQ=
base64:
champ:password
  • 登录

image-20221013084330450

  • 查看源代码

image-20221013084648284

  • 查看文件
Did you notice the file name? Isn't is interesting?

你注意到这个文件名了吗?这不是很有趣吗?

image-20221013084932517

image-20221013084830485

  • 提取文件
steghide extract -sf funny.bmp   密码: sudo
steghide extract -sf funny.jpg

image-20221013085913352

image-20221013090021625

  • 没看懂参考别人的

image-20221013090259213

wtf:this one is a simple one
  • 这个账号密码登陆不上网页

ssh登录

image-20221013090856735

  • 查看文件

image-20221013091026560

VGhlIGZsYWcgaXMgdGhlIGVuY29kZWQgc3RyaW5nIGl0c2VsZg

the flag is the encoded string itsel

image-20221013091319646

n00b
#aw3s0m3p@$$w0rd

切换用户

image-20221013091743839

提权

image-20221013091912109

sudo nano 
^R^X                    #按ctrl+r跟ctrl+x
reset; sh 1>&0 2>&0     #然后输入这个回车

image-20221013092200958

结束