复盘HMVLabs Chapter 1: Venus
Todd

MISSION 0x01

1
2
3
4
Host: venus.hackmyvm.eu
Port: 5000
User: hacker
Pass: havefun!

ssh [email protected] -p 5000 登陆后,进入 Mission 1 :
还有一个 readme.txt 可以先看看

1
2
3
4
cat  mission.txt

# User sophia has saved her password in a hidden file in this folder. Find it and log in as sophia.

就是个隐藏文件,ls -al 就看见了。

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
ls -al

total 44
drwxr-x--- 1 root hacker 4096 Jul 26 2023 .
drwxr-xr-x 1 root root 4096 Jul 26 2023 ..
-rw-r----- 1 root hacker 31 Jul 26 2023 ... <-- Hidden Flag -->
-rw-r--r-- 1 hacker hacker 220 Apr 23 2023 .bash_logout
-rw-r--r-- 1 hacker hacker 3621 Aug 10 14:17 .bashrc
-rw-r----- 1 root hacker 16 Jul 26 2023 .myhiddenpazz
-rw-r--r-- 1 hacker hacker 807 Apr 23 2023 .profile
-rw-r----- 1 root hacker 287 Jul 26 2023 mission.txt
-rw-r----- 1 root hacker 2542 Jul 26 2023 readme.txt

cat .myhiddenpazz
Y1----jc

切换用户su - sophia 进入第二关:

MISSION 0x02

1
2
3
4
5
6
7
8
9
10
11
cat mission.txt

#The user angela has saved her password in a file but she does not remember where ... she only remembers that the file was called whereismypazz.txt

find / -name "whereismypazz.txt" 2>/dev/null`
/usr/share/whereismypazz.txt

# 找到文件后,
/usr/share/whereismypazz.txt
oh----je

切换用户su - angela 进入第三关:

MISSION 0x03

1
2
3
4
5
6
7
cat mission.txt
# The password of the user emma is in line 4069 of the file findme.txt
vim findme.txt
# 输入 :4069 回车, 找到密码 :set number 可以显示行号
# 或者 `sed -n 4069p findme.txt`
fI----8O
su - emma

MISSION 0x04

1
2
3
4
5
cat mission.txt
# User mia has left her password in the file -.
cat ./-
iK----os
su - mia

MISSION 0x05

1
2
3
4
5
6
7
8
9
10
11
12
13
14
cat mission.txt
# It seems that the user camila has left her password inside a folder called hereiam

find / -type d -name "hereiam" 2>/dev/null
/opt/hereiam

ls -al /opt/hereiam
-rw-r--r-- 1 root root 16 Jul 26 2023 .here

cat /opt/hereiam/.here
F6----Oc

su - camila

MISSION 0x06

1
2
3
4
5
6
7
8
9
10
11
12
13
14
cat mission.txt
# The user luna has left her password in a file inside the muack folder.
find / -type d -name "muack" 2>/dev/null
/pwned/camila/muack

ls -al /pwned/camila/muack
# 打开有很多文件夹,用find找到文件
find /pwned/camila/muack -type f 2>/dev/null
/pwned/camila/muack/111/111/muack

cat /pwned/camila/muack/111/111/muack
j3----Mc

su - luna

MISSION 0x07

1
2
3
4
5
6
7
8
cat mission.txt
# The user eleanor has left her password in a file that occupies 6969 bytes.
find / -type f -size 6969c 2>/dev/null
/usr/share/moon.txt

cat /usr/share/moon.txt
UN----7b
su - eleanor

MISSION 0x08

1
2
3
4
5
6
7
8
cat mission.txt
# The user victoria has left her password in a file in which the owner is the user violin.
find / -type f -user violin 2>/dev/null
/usr/local/games/yo

cat /usr/local/games/yo
pz----Sj
su - victoria

MISSION 0x09

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
cat mission.txt
# The user isla has left her password in a zip file.
# 本目录下有一个 passw0rd.zip
unzip passw0rd.zip
# 直接解压没有写入权限,本以为可以去 /var/tmp 下搞,不过里面已经有别人留下的了 里面太乱了,可以提前看下文件解压后的内容
unzip -l passw0rd.zip
# 解压到 /var/tmp
unzip passw0rd.zip -d /var/tmp
# 发现没有权限创建文件夹,scp 搞下来:
scp -P 5000 [email protected]:/pwned/victoria/passw0rd.zip .
# 再本地解压
unzip passw0rd.zip
cat pwned/victoria/passw0rd.txt
D3----Bb
su - isla

MISSION 0x10

1
2
3
4
5
6
7
cat mission.txt
# The password of the user violet is in the line that begins with a9HFX (these 5 characters are not part of her password.).
# 目录下有一个文件 passy,用正则找到 'a9HFX' 开头的这一行
grep -n '^a9HFX' passy
# 708:a9HFXWK----Ac

su - violet

MISSION 0x11

1
2
3
4
5
6
7
cat mission.txt
# The password of the user lucy is in the line that ends with 0JuAZ (these last 5 characters are not part of her password)

grep -n '0JuAZ$' end
505:OC----ud0JuAZ

su - lucy

MISSION 0x12

1
2
3
4
5
6
7
8
cat mission.txt
# The password of the user elena is between the characters fu and ck
# 这次我们换一个方法,用vim 打开文件,然后搜索
vim end
# 输入 /fu(?{1-})ck 回车
fu4x----9tck

su - elena

MISSION 0x13

1
2
3
4
5
6
7
8
9

cat mission.txt
# The user alice has her password is in an environment variable.
env
# 看到
PASS=Cg----qt

su - alice

MISSION 0x14

1
2
3
4
5
6
cat mission.txt
# The admin has left the password of the user anna as a comment in the file passwd.
cat /etc/passwd
# 找到 anna 的密码在:
# alice:x:1014:1014:w8----ox:/pwned/alice:/bin/bash
su - anna

MISSION 0x15

1
2
3
4
5
6
cat mission.txt
# Maybe sudo can help you to be natalia.
sudo -l
# (natalia) NOPASSWD: /bin/bash
sudo -u natalia /bin/bash
cd

MISSION 0x16

1
2
3
4
5
cat mission.txt
# The password of user eva is encoded in the base64.txt file
cat base64.txt | base64 -d
up----AO
su - eva

MISSION 0x17

1
2
3
4
5
6
7
8
9
cat mission.txt
# The password of the clara user is found in a file modified on May 1, 1968.
find / -type f ! -newermt "1968-05-02 00:00:00" 2>/dev/null
# 感觉这个方法应该可以,但是找不到文件,想起来 linux 中最早的时间是 1970-01-01,所以这个题目是故意坑你的。因为这个时间按照时间戳来算是负数,换成:
find / -type f ! -newermt "1970-01-01 00:00:00" 2>/dev/null
# 找到文件后
cat /usr/lib/cmdo
39----N9
su - clara

MISSION 0x18

1
2
3
4
5
6
7
8
9
10
11
12
cat mission.txt
# The password of user frida is in the password-protected zip (rockyou.txt can help you)
# 本目录下有一个 protected.zip,机器上权限不够,scp 搞下来
scp -P 5000 [email protected]:/pwned/clara/protected.zip .
# 拿 hash
zip2john protected.zip > zip.hash
# 然后用 rockyou.txt 破解
john protected.hash --wordlist=/usr/share/wordlists/rockyou.txt
# 拿到密码,解压
unzip protected.zip
# 下一关
su - frida

MISSION 0x19

1
2
3
4
5
6
cat mission.txt
# The password of eliza is the only string that is repeated (unsorted) in repeated.txt
# only string 说的只有一个这样的字符串,是重复的,也就是连续重复的
grep -Pzo '(?m)(.+\n)\1' repeated.txt
# 找到密码
su - eliza

MISSION 0x20

1
2
3
4
5
cat mission.txt
# The user iris has left me her key.
cat .iris_key
# 用这个 key 登陆
ssh [email protected] -i .iris_key

MISSION 0x21

1
2
3
4
5
6
7
8
9
10
11
12
cat mission.txt
# User eloise has saved her password in a particular way.
# 本目录下有一个文件,eloise
file eloise
# eloise: ASCII text
# 看起来是个 base64 编码
cat eloise | base64 -d
# 看到文件头是JFIF 是个jpg文件
cat eloise | base64 -d > /var/tmp/eloise.jpg
scp -P 5000 [email protected]:/var/tmp/eloise.jpg .
# 打开图片,看到密码,注意这里有个坑,多看看字母、数字、大小写
su - eloise

MISSION 0x22

1
2
3
4
5
6
7
8
9
cat mission.txt
# User lucia has been creative in saving her password.
# 本目录下有一个文件,hi
cat hi
# 00000000: 7576 4d77 4644 5172 5157 504d 6547 500a
# Hexdmp 一下 ,看到密码
xxd -r hi

su - lucia

MISSION 0x23

1
2
3
4
5
6
7
8
9
cat mission.txt
# The user isabel has left her password in a file in the /etc/xdg folder but she does not remember the name, however she has dict.txt that can help her to remember.

# 本目录下有一个文件,dict.txt (里面有一个 hidden flag)

# 用dict.txt中的每一行作为参数,执行cat命令
xargs -a dict.txt -I {} cat /etc/xdg/{} 2
# 发现密码
su - isabel

MISSION 0x24

1
2
3
4
5
6
cat mission.txt
# The password of the user freya is the only string that is not repeated in different.txt
# 只有一个不重复的字符串
sort different.txt | uniq -u
# 找到密码
su - freya

MISSION 0x25

1
2
3
4
5
6
7
8
cat mission.txt
# User alexa puts her password in a .txt file in /free every minute and then deletes it.
# /free 这个目录下有一个 txt 文件,马上回删掉
watch -n 1 cat /free/*.txt
# 等待一分钟,看到密码,手动停掉,如果你不够快的话,可以写个循环
while true; do cat /free/*.txt; sleep 1;done;
# 其实也不是一分钟,了解linux crontab的话,可以知道,是 0 秒的时后执行的.
su - alexa

MISSION 0x26

1
2
3
4
5
cat mission.txt
# The password of the user ariel is online! (HTTP)
curl localhost
# 找到密码
su - ariel

MISSION 0x27

1
2
3
4
5
6
7
8
cat mission.txt
# Seems that ariel dont save the password for lola, but there is a temporal file.
# 本目录下有一个文件,.goas.swp 这种是 vim 的临时文件
vim .goas
# 会提示你是否恢复,输入 r 回车 或者 vim -r .goas
# 可能还有一个提示,告诉你现在有几个人,那几个历史,选择一个,我 选的 1,root 用户的。
# 里面有一堆密码,挨个试试就行,或者 hydra 跑一下,不过按照出题一般的规律,都是中间偏下,我试了 3 个就出来了。
su - lola

MISSION 0x28

1
2
3
4
5
6
7
8
9
10
11
12
cat mission.txt
# The user celeste has left a list of names of possible .html pages where to find her password.
# 本目录下有一个文件,pages.txt
cat pages.txt
# 里面是一堆文件名,配合 xargs
xargs -a pages.txt -I {} curl localhost/{} 2>/dev/null
# 或者 直接去/var/www/html/下找
xargs -a pages.txt -I {} find /var/www/html/ -name "{}.html" 2>/dev/null
# 找到密码
/var/www/html/cebolla.html
curl localhost/cebolla.html
su - celeste

MISSION 0x29

1
2
3
4
5
6
7
8
9
10
11
12
cat mission.txt
# The user celeste has access to mysql but for what?
mysql -u celeste -p
show databases;
use venus;
show tables;
select * from people;
# 此处有一个 hidden flag
# 里面有一堆用户,那下一个用户是谁呢?
cat /etc/passwd
# celeste的下一个用户是 nina,sql 中也有,于是
su - nina

MISSION 0x30

1
2
3
4
5
6
7
8
9
10
cat mission.txt
# The user kira is hidding something in http://localhost/method.php
curl localhost/method.php
# I dont like this method!
# 用 POST 请求
curl -X POST localhost/method.php
# 还是没有,HTTP一共就没几个Method,常用的GET,POST,PUT,DELETE,HEAD,OPTIONS,TRACE,CONNECT
curl -X PUT localhost/method.php
# 找到密码
su - kira

MISSION 0x31

1
2
3
4
5
6
7
8
cat mission.txt
# The user veronica visits a lot http://localhost/waiting.php
curl localhost/waiting.php
# Im waiting for the user-agent PARADISE
# 用 user-agent 请求
curl -A "PARADISE" localhost/waiting.php
# 找到密码
su - veronica

MISSION 0x32

1
2
3
4
5
cat mission.txt
# The user veronica uses a lot the password from lana, so she created an alias
alias
# 找到密码
su - lana

MISSION 0x33

1
2
3
4
5
6
7
8
9
10
cat mission.txt
# The user noa loves to compress her things.
# 本目录下有一个文件,zip.gz
# 先scp
scp -P 5000 [email protected]:/pwned/lana/zip.gz .
# 然后解压
tar -zxvf zip.gz
cat pwned/lana/zip
# 找到密码
su - noa

MISSION 0x34

1
2
3
4
5
6
7
8
9
10
cat mission.txt
# The password of maia is surrounded by trash
# 本目录下有一个文件,trash
file trash
# trash: OpenPGP Secret Key
# 看起来是个 gpg 文件,去折腾了一会 OpenPGP Secret Key,直接 vim,在众多乱码中找到密码,才悟到这个题目的意思。 surrounded by trash

# 后来看到大傻子的 wp,发现这个文件是个二进制文件,用 strings 命令就可以看到密码了。
strings trash
su - maia

MISSION 0x35

1
2
3
4
5
6
7
8
9
10
11
12
13
cat mission.txt
# The user gloria has forgotten the last 2 characters of her password ... They only remember that they were 2 lowercase letters.

cat forget
# v7xUVE2e5bjUc??

# 用 crunch 生成密码
crunch 15 15 -t v7xUVE2e5bjUc@@ >> pass_for_gloria.txt
# 然后用 hydra 跑一下
hydra -l gloria -P pass_for_gloria.txt -s 5000 venus.hackmyvm.eu ssh

# 找到密码
su - gloria

MISSION 0x36

1
2
3
4
5
6
7
8
cat mission.txt
# User alora likes drawings, that's why she saved her password as ...
file image
# image: ASCII text
# 嗯?文本?
cat image
# 是个二维码,用手机扫一下,得到密码

MISSION 0x37

1
2
3
4
5
6
7
8
9
10
cat mission.txt
# The user julie has created an iso with her password.
# 本目录下有一个文件,iso
file music.iso
# music.iso: ISO 9660 CD-ROM filesystem data 'CDROM'
# 既然有密码,那么
strings music.iso
# 找到密码

su - julie

MISSION 0x38

1
2
3
4
5
6
cat mission.txt
# The user irene believes that the beauty is in the difference.
# 本目录下有1.txt 2.txt
diff 1.txt 2.txt
# 找到密码
su - irene

MISSION 0x39

1
2
3
4
5
6
7
8
9
10
11
cat mission.txt
# The user adela has lent her password to irene.
-rw-r----- 1 root irene 1704 Jul 26 2023 id_rsa.pem
-rw-r----- 1 root irene 451 Jul 26 2023 id_rsa.pub
-rw-r----- 1 root irene 178 Jul 26 2023 mission.txt
-rw-r----- 1 root irene 256 Jul 26 2023 pass.enc

# 应该是解密
openssl rsautl -decrypt -inkey id_rsa.pem -in pass.enc
# 找到密码
su - adela

MISSION 0x40

1
2
3
4
5
6
7
cat mission.txt
# User sky has saved her password to something that can be listened to.
# 本目录下有一个文件,wtf
cat wtf
# .--. .- .--. .- .--. .- .-. .- -.. .. ... .
# 用摩斯密码解密,找到密码,注意密码小写
su - sky

MISSION 0x41

1
2
3
4
5
6
7
8
# User sarah uses header in http://localhost/key.php
# 这里输入 history 有一个 hidden flag (有一个 .bash_history 文件)
curl -H "key" localhost/key.php
# Key header is true? 看来是要用 key:true
curl -H "key: true" localhost/key.php

# 找到密码
su - sarah

MISSION 0x42

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
cat mission.txt
# The password of mercy is hidden in this directory.
# 本目录下有一个文件, 我找了很久才发现
drwxr-x--- 2 root sarah 4096 Jul 26 2023 .
drwxr-xr-x 1 root root 4096 Jul 26 2023 ..
-rw-r----- 1 root sarah 16 Jul 26 2023 ...
-rw-r--r-- 1 sarah sarah 220 Apr 23 2023 .bash_logout
-rw-r--r-- 1 sarah sarah 3526 Apr 23 2023 .bashrc
-rw-r--r-- 1 sarah sarah 807 Apr 23 2023 .profile
-rw-r----- 1 root sarah 31 Jul 26 2023 flagz.txt
-rw-r----- 1 root sarah 175 Jul 26 2023 mission.txt

cat ...
# 找到密码
su - mercy

MISSION 0x43

1
2
3
4
5
6
cat mission.txt
# User mercy is always wrong with the password of paula.
# 既然经常错,那么
history
# 找到密码
su - paula

MISSION 0x44

1
2
3
4
5
6
7
8
9
10
11
cat mission.txt
# The user karla trusts me, she is part of my group of friends.
# 我的组里? 看下:
groups
# paula hidden
# 我有一个 hidden 的组,那么,看下 组hidden都有那些文件
find / -group hidden 2>/dev/null
# /usr/src/.karl-a
cat /usr/src/.karl-a
# 找到密码
su - karla

MISSION 0x45

1
2
3
4
5
6
7
8
9
10
cat mission.txt
# User denise has saved her password in the image.
# 本目录下有一个文件,yuju.jpg
file yuju.jpg
# yuju.jpg: JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=4], baseline, precision 8, 442x463, components 3

# 是不是在 exif 里面?
exiftool yuju.jpg
# 找到密码
su - denise

MISSION 0x46

1
2
3
4
5
6
cat mission.txt
# The user zora is screaming doas!
# 用 doas 命令
doas -u zora /bin/bash
cd

MISSION 0x47

1
2
3
4
5
6
cat mission.txt
# The user belen has left her password in venus.hmv
# 没有其他提示了。直接 curl 一下?
curl venus.hmv
# 找到密码
su - belen

MISSION 0x48

1
2
3
4
5
6
7
8
9
cat mission.txt
# It seems that belen has stolen the password of the user leona...
# 本目录下有一个文件,stolen.txt
cat stolen.txt
# $1$leona$lhWp56YnWAMz6z32Bw53L0
# 这是个 hash,用 john 破解
john stolen.txt --wordlist=/usr/share/wordlists/rockyou.txt
# 找到密码
su - leona

MISSION 0x49

1
2
3
4
5
6
7
8
9
cat mission.txt
# User ava plays a lot with the DNS of venus.hmv lately...
# dns ?
cat /etc/resolv.conf
# 看到 nameserver 127.0.0.11
# 查看所有 dns 配置
cat /etc/bind/*
# 找到密码
su - ava

MISSION 0x50

1
2
3
4
cat mission.txt
# The password of maria is somewhere...
# 最后一关,果然没有提示了. 最后看了别人的 WP 才知道,密码竟然是那个摩斯密码。。。
su - maria

MISSION 0x51

1
2
3
4
cat mission.txt
# Congrats!

# 至此 50 关全部通关

学到的技巧总结:

如果有一个文件名为 - ,可以使用 cat ./- 来读取文件内容。

find 命令:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
find / -name "filename.txt"

# 如何用 byte 的大小找到文 找到大小为 6969 字节的文件
find / -type f -size 6969c

# 去掉无权限的报错:
find / -type f -size 6969c 2>/dev/null

# 用 owner/group 来 find 文件
find / -type f -user root 2>/dev/null
find / -type f -group hidden 2>/dev/null

# 查找在过去7天内被修改的文件
find /path/to/search -mtime -7

## grep 命令:

```bash
# 在 /etc 目录下查找包含 "password" 的文件
grep -r "password" /etc

# 找到连续两个一样的
grep -Pzo '(?m)(.+\n)\1' repeated.txt

xargs 命令:

1
2
3
4
5
6
7
8
# 用dict.txt中的每一行作为参数,执行cat命令
xargs -a dict.txt -I {} cat /etc/xdg/{}/


#-a dict.txt: 指定文件 dict.txt 作为 xargs 的输入。
#-I {}: 指定占位符 {} 用于替换参数。
#cat /etc/xdg/{}: 拼接 /etc/xdg/ 和从 dict.txt 中读取的每个文件名,并将其作为参数传递给 cat 命令。

awk 命令:

1
2
# 找到重复的行
sort different.txt | uniq -u | awk 'NR==1{print}'
 评论
评论插件加载失败
正在加载评论插件
由 Hexo 驱动 & 主题 Keep
本站由 提供部署服务
总字数 76.2k 访客数 访问量