1. nmap扫端口 2. WEB先查 robots.txt ,而后目录爆破 3. 留意文件中隐藏的内容 4. 查看/etc/中程序中的配置,找登录凭证
爆破目录与文件,发现/flag/目录,访问得到第一个flaghtml
The 1st flag is : {8734509128730458630012095}
访问爆破的目录/admin_area/,发现第二个flag和一对用户名密码并发
username : admin password : 3v1l_H@ck3r The 2nd flag is : {7412574125871236547895214}
The 3rd flag is : {7645110034526579012345670} try to find user technawi password to read the flag.txt file, you can find it in a hidden file ;)
找隐藏文件这块用来很长的时间,最后经过暴力搜索的方式找到:grep -ri technawi /etc/
ssh
The 4th flag is : {7845658974123568974185412} username : technawi password : 3vilH@ksor
用technawi登录ssh,打开/var/www/html/flag.txtide
The 5th flag is : {5473215946785213456975249}
传送门code