Help kaneki escape jason room.
Nmap Output:
Home Page:
view-source:http
anonymous@ftp
First of all, I printed the aogiri, but honestly there is not much.
We see that need_to_talk is executable.
Looks like we got our password
Then we need to obtain the other .txt file with this password.
When we see this hashed message, of course, "brainfuck" comes to our mind.
CyberChef
d1r3c70ry_center
When we go to the page, it clearly tells us what we need to do.
Meanwhile, Kaneki looks like he's in a lot of pain. I think we'd better hurry up a bit :D
Let's go to the /claim page.
When we press NO or YES, the page URL brings to mind LFI attack.
index.php?view=../../../../../../..//etc/passwd
When we try it, we can see that it is filtered.
Let's try our luck with the url encoder.
%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2Fetc%2Fpasswd
it worked
lets crack the password of user kamishiro
Now that we have the password, let's log in to SSH.
While we found User.txt, the jail.py file also looks interesting.
When we look at the content of the jail.py file
The image when we run it is as follows:
also
we can use this python file to read /root/root.txt file.
After doing some research on the internet, I found a way to escape from these jail files.
https://anee.me/escaping-python-jails-849c65cf306e