Level 1: Use the/usr/hashcat program to decrypt the root password in passwd and obtain gravity98.
Run Su and enter the password gravity98.
Second off: Get the provided tool, wget http://area6.net/tools
Get the task cat area6.
Execute portscan 203.59.0.206 and find FTP is enabled.
Run ftpexploxit to obtain the target root shell.
Clear logs.
Level 3: Mail acquisition task
Wget tool,
Brute force cracking tool bruteforcer 116.233.142138
The account is FTP and the password is janitor. Telnet login. Clear logs.
Find and enter the ETC folder, delete the welcome. MSG file, and execute welcome. Obtain the root permission.
Level 4: Mail acquisition task
Telnet 92.13.211.4. Guess password 123456. login successful. Clear logs.
View the file, get the check_status.sh file under TMP, and learn the su password from the file.
The su password is t0ps3cr3t. Obtain the root permission.
Article 5: Mail acquisition task
Still obtain the FTP password cowboy from bruteforcer. Telnet login.
Ls/bin, the tool ipsniff is found. Run. Gets the root password cs6Xk-11b.
Su to obtain the root permission.
Article 6: Mail acquisition task
Telnet uses the account Brian and password swing1999 to log on to the cs6Xk-11b,
Use the code in/usr to generate a token. Obtain the root permission.
Temporarily stuck here.
The hacker's sanbox game