Skip to content

Latest commit

 

History

History
39 lines (37 loc) · 1.59 KB

stages.md

File metadata and controls

39 lines (37 loc) · 1.59 KB

level02

  1. We are given file level02.pcap
  2. pcap - net trafic log format for WireShark
  3. (On outer Linux/MacOS host) Copy pcap file to outer host and change access rules
scp -P 4242 level02@<snow_crash VM IP adress>:/home/user/level02/level02.pcap .
chmod 777 ./level02.pcap
  1. (On outer Linux/MacOS host) Run WireShark with this file
wireshark ./level02.pcap
  1. We see log of TCP packages. To see what text message they transported, do right click on any packages -> Follow -> TCP Stream, then this output occurs
..%..%..&..... ..#..'..$..&..... ..#..'..$.. .....#.....'........... .38400,38400....#.SodaCan:0....'..DISPLAY.SodaCan:0......xterm.........."........!........"..".....b........b....	B.
..............................1.......!.."......"......!..........."........"..".............	..
.....................
Linux 2.6.38-8-generic-pae (::ffff:10.1.1.2) (pts/10)

..wwwbugs login: l.le.ev.ve.el.lX.X
..
Password: ft_wandr...NDRel.L0L
.
..
Login incorrect
wwwbugs login:
  1. The most interesting part - potential password: ft_wandr...NDRel.L0L. But it didin't work.
  2. So we check each TCP package containing chars of password and see that . is not a normal symbol of dot, but a 7F octal sybol. According to ASCII table it's 7F is DELETE.
  3. Rewrite password using DELETE instead of each dot: ft_waNDReL0L
  4. Go to flag02 user and get flag:
su flag02
getflag
  1. Flag for level03: kooda2puivaav1idi4f57q8iq