일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | ||||||
2 | 3 | 4 | 5 | 6 | 7 | 8 |
9 | 10 | 11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 | 21 | 22 |
23 | 24 | 25 | 26 | 27 | 28 |
Tags
- 해킹
- picoCTF 2021
- 정보보안산업기사 필기
- CTF
- picoGym
- root
- Whitehacker
- 디지털포렌식 자격증
- Hack The Box
- TryHackMe
- hacker
- 25 Days of Cyber Security
- flag
- INFOSEC
- 디지털포렌식
- picoCTF
- htb
- 리눅스마스터 자격증
- Cybersecurity
- 리눅스마스터 2급 2차
- 디지털포렌식 전문가 2급
- 정보보안산업기사 자격증
- 정보보안
- hackthebox
- kali-linux
- TryHackeMe
- 포렌식
- THM
- Capture The Flag
- 자격증
Archives
- Today
- Total
root@j4sper:~#
picoCTF 2021 | Magikarp Ground Mission 본문
Workstation | |
Virtual Box | VMware Fusion 12.1.1 |
OS | kali-linux-2021.01 |
Hint
- Finding a cheatsheet for bash would be really helpfull
Start Instance
Connect ssh
$ sudo ssh ctf-player@venus.picoctf.net -p 51959
The authenticity of host '[venus.picoctf.net]:51959 ([3.131.124.143]:51959)' can't be established.
ECDSA key fingerprint is SHA256:NrQkIxNEQQho/GA7jE0WlIa7Jh4VF9sAvC5awkbuj1Q.
Are you sure you want to continue connecting (yes/no/[fingerprint])? yes
Warning: Permanently added '[venus.picoctf.net]:51959,[3.131.124.143]:51959' (ECDSA) to the list of known hosts.
ctf-player@venus.picoctf.net's password:
Welcome to Ubuntu 18.04.5 LTS (GNU/Linux 5.4.0-1041-aws x86_64)
* Documentation: https://help.ubuntu.com
* Management: https://landscape.canonical.com
* Support: https://ubuntu.com/advantage
This system has been minimized by removing packages and content that are
not required on a system that users do not log into.
To restore this content, you can run the 'unminimize' command.
The programs included with the Ubuntu system are free software;
the exact distribution terms for each program are described in the
individual files in /usr/share/doc/*/copyright.
Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by
applicable law.
ctf-player@pico-chall$ ls
1of3.flag.txt instructions-to-2of3.txt
ctf-player@pico-chall$ cat 1of3.flag.txt
picoCTF{xxsh_
ctf-player@pico-chall$ cat instructions-to-2of3.txt
Next, go to the root of all things, more succinctly `/`
ctf-player@pico-chall$ cd /
ctf-player@pico-chall$ ls
2of3.flag.txt boot etc instructions-to-3of3.txt lib64 mnt proc run srv tmp var
bin dev home lib media opt root sbin sys usr
ctf-player@pico-chall$ cat 2of3.flag.txt
0ut_0f_\/\/4t3r_
ctf-player@pico-chall$ cat instructions-to-3of3.txt
Lastly, ctf-player, go home... more succinctly `~`
ctf-player@pico-chall$ cd ~
ctf-player@pico-chall$ ls
3of3.flag.txt drop-in
ctf-player@pico-chall$ cat 3of3.flag.txt
c1754242}
ctf-player@pico-chall$
Flag : picoCTF{xxsh_0ut_0f_\/\/4t3r_c1754242}
'Walkthrough > picoCTF' 카테고리의 다른 글
picoCTF 2021 | Insp3ct0r (0) | 2021.05.24 |
---|---|
picoCTF 2021 | Matryoshka doll (0) | 2021.05.20 |
picoCTF 2021 | information (0) | 2021.04.25 |
picoCTF 2021 | Tab, Tab, Attack (0) | 2021.04.25 |
picoCTF 2021 | GET aHEAD (0) | 2021.04.25 |
Comments