Metasploitable 3
The Seven of Hearts
For this one I used SSH with the Administrator account with the password that I guessed for another flag/card.
I remembered there was a flag in the C:\inetpub\wwwroot folder and went to take a look at the folder:
root@igor-kali:~/metasploitable3# ssh Administrator@10.20.10.23
Administrator@10.20.10.23’s
password:
Last login: Sat Dec 17
12:41:58 2016 from 10.20.10.18
-sh-4.3$ pwd
/cygdrive/c/Users/Administrator
-sh-4.3$ cd ../../inetpub
-sh-4.3$ pwd
/cygdrive/c/inetpub
-sh-4.3$ cd wwwroot
-sh-4.3$ ls
aspnet_client caidao.asp
hahaha.jpg index.html seven_of_hearts.html six_of_diamonds.zip welcome.png
Burp Suite showing base64 URL |
root@igor-kali:~/metasploitable3# cat
seven_of_hearts2.url | perl -ne 'print $1 if(/GET \/(.*)HTTP/g)' >
seven_of_hearts.b64
and then decoded the base64 string to binary
root@igor-kali:~/metasploitable3# cat seven_of_hearts.b64 | base64 -d >
seven_of_hearts.png
base64: invalid input
root@igor-kali:~/metasploitable3# file seven_of_hearts.png
seven_of_hearts.png: PNG
image data, 521 x 729, 8-bit/color RGBA, non-interlaced
Johnny Bravo? |
No comments:
Post a Comment