Steamをインストール
ログイン
|
言語
简体中文(簡体字中国語)
繁體中文(繁体字中国語)
한국어 (韓国語)
ไทย (タイ語)
български (ブルガリア語)
Čeština(チェコ語)
Dansk (デンマーク語)
Deutsch (ドイツ語)
English (英語)
Español - España (スペイン語 - スペイン)
Español - Latinoamérica (スペイン語 - ラテンアメリカ)
Ελληνικά (ギリシャ語)
Français (フランス語)
Italiano (イタリア語)
Bahasa Indonesia(インドネシア語)
Magyar(ハンガリー語)
Nederlands (オランダ語)
Norsk (ノルウェー語)
Polski (ポーランド語)
Português(ポルトガル語-ポルトガル)
Português - Brasil (ポルトガル語 - ブラジル)
Română(ルーマニア語)
Русский (ロシア語)
Suomi (フィンランド語)
Svenska (スウェーデン語)
Türkçe (トルコ語)
Tiếng Việt (ベトナム語)
Українська (ウクライナ語)
翻訳の問題を報告
1. Some people foolishly allow guest accounts to access things they shouldnt. Try using the file explorer and going all the way up in the directory to the /etc folder and see if you can view or copy the passwd file. From there, decipher root password and then from the guest shell youre logged in at. Type "sudo -s" and enter the root password. Bam you're now root.
2. From the guest account go up a level so you can see the names of the other users. Then use social engineering with one of those names. Then do "sudo -u" to switch to their account, which should have privileges to access the passwd file in /etc for sure. Then just follow the steps from the first solution where you decipher the passwd file and gain root access.
Hope that helps!
I thought about using the usernames for social-engineering, but without the user's real name I can't do anything, can I?
Gotcha, I'll try this one out and see what happens. Thanks mate!
your@profile:~$ nmap 222.255.126.183
Starting nmap v1.1 at 01/Jan/2000 - 19:31
Interesting ports on 222.255.126.183
PORT STATE SERVICE VERSION LAN
3306 open students 1.0.0 10.0.23.2
80 open http 1.0.0 10.0.23.2
3307 open employees 1.0.0 10.0.23.2
your@profile:~$ /home/your/Exploits/http/1.0.0 222.255.126.183 80
Starting attack...success!
Privileges obtained from user: guest
guest@Alinusxd27:~$ ls /home
Imonin
guest
guest@Alinusxd27:~$ cat /home/Imonin/Config/Mail.txt
Imonin@leinsu.org:e0b5758b1b86be7658b4e2de34986737
your@profile:~$ whois 222.255.126.183
Domain name: www.leinsu.org
Administrative contact: Joleen Kegas
Email address: Kegas@leinsu.org
Phone: 732761458
Sending “administrative action” email to the email “Imonin@leinsu.org” with the name of the admin “Joleen Kegas” then receiving the Imonin password "sublest"
guest@Alinusxd27:~$ sudo -u Imonin
Password: sublest
Imonin@Alinusxd27:~$ FileExplorer.exe
Access to the /etc/passwd file then copy root access, put it on a note on your profile to decrypt it with decipher "Watewa"
Imonin@Alinusxd27:~$ sudo -u root
Password: Watewa
root@Alinusxd27:/root# FileExplorer.exe
Do all you want and go to the log at the end for erase your traces and after leave.
root@Alinusxd27:/root# exit
Imonin@Alinusxd27:~$ exit
guest@Alinusxd27:~$ exit