DC1(VulnHub)

DC1(VulnHub)

1

image-20240204001102776

2

image-20240204001133331

3

image-20240204001211697

4、flag1提示

image-20240204001224175

flag1提示:Every good CMS needs a config file - and so do you.

5、flag2提示

image-20240204001236972

flag2提示:Brute force and dictionary attacks aren't the only ways to gain access (and you WILL need access). What can you do with these credentials?

6

image-20240204001334119

image-20240204001348191

7

image-20240204001356363

账号:admin

密码:admin

8、flag3提示

image-20240204001443075

image-20240204001448836

image-20240204001454206

flag3提示:Special PERMS will help FIND the passwd - but you'll need to -exec that command to work out how to get what's in the shadow.

9、flag4提示

image-20240204001541532

flag4提示:Can you use this same method to find or access the flag in root? Probably. But perhaps it's not that easy. Or maybe it is?

10、thefinalflag提示

image-20240204001604473

image-20240204001613373

thefinalflag提示:

Well done!!!!

Hopefully you've enjoyed this and learned some new skills.

You can let me know what you thought of this little journey

by contacting me via Twitter - @DCAU7

posted @ 2024-02-05 00:16  gcc_com  阅读(8)  评论(0编辑  收藏  举报