## 指令 ```sudo docker pull happyandy1121/linux-basic``` 下載指令 ```sudo docker images``` 看imagesID ```sudo docker run -d -p [port]:22 [imageID]``` 執行 ```ssh ph@127.0.0.1 -p [port]``` 進入靶機 ## Linux basic ```ssh ph@127.0.0.1 -p [port]``` 就可以看到了 ## mewmew ```cat flag.jpg``` or ```cat flag.jpg | grep "PH"``` ## Unreadable message ```strings flag.txt``` or ```strings flag.txt | grep "PH"``` **注意這邊不要打成string** ## run run run ```python3 flag.py``` **注意他們有沒有打成python** ## Can you find me ouo? ```sudo unzip flag.zip``` ```cd SecretFolder``` ```ls -la``` ```./.flag.out``` ## What the hell is that !? ```cat flag.txt |grep "PH{" |grep "}"``` ```cat flag.txt |grep "PH{" |grep -v "G{"``` **-v 是反向過濾** ## Open the door ```sudo chmod 777 flag``` ```./flag``` **可以叫他們 ls -l 去看一下 rwx** ## Can you run again? ```g++ flag.o``` 這邊會說找不到g++,所以安裝 ```sudo apt install g++``` ```g++ flag.o``` 發現權限不足 用sudo ```sudo g++ flag.o``` ```ls``` 看到a.out ```./a.out``` **這邊可以讓他們去網路找什麼是.o檔 怎麼做** ## Can_you_find_again_uwu? ```find . -name "*.txt"``` ```cd 4/6/2/8``` ```ls -la``` 因為檔案是隱藏的,所以要用a ```cat .secret.txt``` 權限不夠 你可以跟他們說那個rwx 我全部清空了 ```sudo chmod 777 .secret.txt``` ```cat .secret.txt``` ## secret ```file secret.jpg``` 可以讓他們自己看那些描述 真看不懂再提示他其實是zip檔案 ```sudo unzip secret.jpg``` 這邊需要sudo ```ls``` 發現多了一個flag.jpg ```exit``` ```scp -P [port] ph@127.0.0.1:~/secret/flag.jpg ./``` 要輸入密碼,檔案會在根目錄,是一張圖片,檔案總管點開預設是根目錄
×
Sign in
Email
Password
Forgot password
or
By clicking below, you agree to our
terms of service
.
Sign in via Facebook
Sign in via Twitter
Sign in via GitHub
Sign in via Dropbox
Sign in with Wallet
Wallet (
)
Connect another wallet
New to HackMD?
Sign up