{"id":692,"date":"2024-06-14T20:27:27","date_gmt":"2024-06-14T12:27:27","guid":{"rendered":"http:\/\/162.14.82.114\/?p=692"},"modified":"2024-06-14T20:27:27","modified_gmt":"2024-06-14T12:27:27","slug":"%e7%ac%ac%e4%b8%80%e7%ab%a0-%e5%ba%94%e6%80%a5%e5%93%8d%e5%ba%94-linux%e6%97%a5%e5%bf%97%e5%88%86%e6%9e%90","status":"publish","type":"post","link":"http:\/\/162.14.82.114\/index.php\/692\/06\/14\/2024\/","title":{"rendered":"\u7b2c\u4e00\u7ae0 \u5e94\u6025\u54cd\u5e94-Linux\u65e5\u5fd7\u5206\u6790"},"content":{"rendered":"<h1>\u7b2c\u4e00\u7ae0 \u5e94\u6025\u54cd\u5e94-Linux\u65e5\u5fd7\u5206\u6790<\/h1>\n<p><div class='fancybox-wrapper lazyload-container-unload' data-fancybox='post-images' href='https:\/\/pic-for-be.oss-cn-hangzhou.aliyuncs.com\/img\/202406142013489.png'><img class=\"lazyload lazyload-style-2\" src=\"data:image\/svg+xml;base64,PCEtLUFyZ29uTG9hZGluZy0tPgo8c3ZnIHdpZHRoPSIxIiBoZWlnaHQ9IjEiIHhtbG5zPSJodHRwOi8vd3d3LnczLm9yZy8yMDAwL3N2ZyIgc3Ryb2tlPSIjZmZmZmZmMDAiPjxnPjwvZz4KPC9zdmc+\"  decoding=\"async\" data-original=\"https:\/\/pic-for-be.oss-cn-hangzhou.aliyuncs.com\/img\/202406142013489.png\" src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAAAXNSR0IArs4c6QAAAARnQU1BAACxjwv8YQUAAAAJcEhZcwAADsQAAA7EAZUrDhsAAAANSURBVBhXYzh8+PB\/AAffA0nNPuCLAAAAAElFTkSuQmCC\" alt=\"image-20240614191517670\" style=\"zoom:50%;\" \/><\/div><\/p>\n<h2>\u57fa\u7840\u4fe1\u606f\u641c\u96c6<\/h2>\n<pre><code class=\"language-bash\">hgbe02@pwn:~\/temp$ ssh root@69.230.247.36\nThe authenticity of host &#039;69.230.247.36 (69.230.247.36)&#039; can&#039;t be established.\nED25519 key fingerprint is SHA256:YaKYCubzBNoPqUFqbT3FPvAWs34syoDa\/ex4NYogZqw.\nThis key is not known by any other names\nAre you sure you want to continue connecting (yes\/no\/[fingerprint])? yes\nWarning: Permanently added &#039;69.230.247.36&#039; (ED25519) to the list of known hosts.\nroot@69.230.247.36&#039;s password:\nLinux ip-10-0-10-1 4.19.0-25-cloud-amd64 #1 SMP Debian 4.19.289-1 (2023-07-24) x86_64\n\nThe programs included with the Debian GNU\/Linux system are free software;\nthe exact distribution terms for each program are described in the\nindividual files in \/usr\/share\/doc\/*\/copyright.\n\nDebian GNU\/Linux comes with ABSOLUTELY NO WARRANTY, to the extent\npermitted by applicable law.\nLast login: Tue Aug  1 07:50:37 2023 from 192.168.200.2\nroot@ip-10-0-10-1:~# whoami;id\nroot\nuid=0(root) gid=0(root) groups=0(root)\nroot@ip-10-0-10-1:~# ip a\n1: lo: &lt;LOOPBACK,UP,LOWER_UP&gt; mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000\n    link\/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00\n    inet 127.0.0.1\/8 scope host lo\n       valid_lft forever preferred_lft forever\n    inet6 ::1\/128 scope host\n       valid_lft forever preferred_lft forever\n2: eth0: &lt;BROADCAST,MULTICAST,UP,LOWER_UP&gt; mtu 9001 qdisc pfifo_fast state UP group default qlen 1000\n    link\/ether 02:58:04:2c:a8:90 brd ff:ff:ff:ff:ff:ff\n    inet 10.0.10.1\/16 brd 10.0.255.255 scope global dynamic eth0\n       valid_lft 3541sec preferred_lft 3541sec\n    inet6 fe80::58:4ff:fe2c:a890\/64 scope link\n       valid_lft forever preferred_lft forever<\/code><\/pre>\n<h2>\u6709\u591a\u5c11IP\u5728\u7206\u7834\u4e3b\u673assh\u7684root\u5e10\u53f7<\/h2>\n<blockquote>\n<p>\u6709\u591a\u5c11IP\u5728\u7206\u7834\u4e3b\u673assh\u7684root\u5e10\u53f7\uff0c\u5982\u679c\u6709\u591a\u4e2a\u4f7f\u7528&quot;,&quot;\u5206\u5272<\/p>\n<\/blockquote>\n<pre><code class=\"language-bash\">root@ip-10-0-10-1:~# cd \/var\/log\nroot@ip-10-0-10-1:\/var\/log# ls -la\ntotal 2476\ndrwxr-xr-x  6 root root   4096 Jun 14 11:55 .\ndrwxr-xr-x 11 root root   4096 Nov 18  2022 ..\n-rw-r--r--  1 root root      0 Jun 14 11:55 alternatives.log\n-rw-r--r--  1 root root  31451 Aug  1  2023 alternatives.log.1\ndrwx------  3 root root   4096 Aug  1  2023 amazon\ndrwxr-xr-x  2 root root   4096 Jun 14 11:55 apt\n-rw-r-----  1 root adm     393 Jun 14 11:55 auth.log\n-rw-r-----  1 root adm   17873 Jun 14 11:55 auth.log.1\n-rw-r--r--  1 root root    600 Aug  1  2023 aws114_ssm_agent_installation.log\n-rw-r--r--  1 root root 453632 Nov 18  2022 bootstrap.log\n-rw-rw----  1 root utmp      0 Jun 14 11:55 btmp\n-rw-rw----  1 root utmp  18432 Aug  1  2023 btmp.1\n-rw-r--r--  1 root adm  508488 Jun 14 11:55 cloud-init.log\n-rw-r-----  1 root adm   44420 Jun 14 11:55 cloud-init-output.log\n-rw-r-----  1 root adm    5181 Jun 14 11:56 daemon.log\n-rw-r-----  1 root adm  144189 Jun 14 11:55 daemon.log.1\n-rw-r-----  1 root adm       0 Jun 14 11:55 debug\n-rw-r-----  1 root adm   43411 Jun 14 11:55 debug.1\n-rw-r--r--  1 root root      0 Jun 14 11:55 dpkg.log\n-rw-r--r--  1 root root 211484 Aug  1  2023 dpkg.log.1\n-rw-r--r--  1 root root  32064 Aug  1  2023 faillog\n-rw-r-----  1 root adm       0 Jun 14 11:55 kern.log\n-rw-r-----  1 root adm  241683 Jun 14 11:55 kern.log.1\n-rw-rw-r--  1 root utmp 292584 Jun 14 11:55 lastlog\n-rw-r-----  1 root adm     991 Jun 14 11:55 messages\n-rw-r-----  1 root adm  223852 Jun 14 11:55 messages.1\ndrwxr-xr-x  2 ntp  ntp    4096 Mar 21  2019 ntpstats\ndrwx------  2 root root   4096 Nov 26  2022 private\n-rw-r-----  1 root adm    6326 Jun 14 11:56 syslog\n-rw-r-----  1 root adm  412413 Jun 14 11:55 syslog.1\n-rw-r-----  1 root adm     837 Jun 14 11:55 user.log\n-rw-r-----  1 root adm   24221 Aug  1  2023 user.log.1\n-rw-rw-r--  1 root utmp  21504 Jun 14 11:55 wtmp\nroot@ip-10-0-10-1:\/var\/log# cat auth.log\nJun 14 11:55:54 ip-10-0-10-1 sshd[603]: Accepted password for root from 218.201.30.74 port 4614 ssh2\nJun 14 11:55:54 ip-10-0-10-1 sshd[603]: pam_unix(sshd:session): session opened for user root by (uid=0)\nJun 14 11:55:54 ip-10-0-10-1 systemd-logind[428]: New session 1 of user root.\nJun 14 11:55:54 ip-10-0-10-1 systemd: pam_unix(systemd-user:session): session opened for user root by (uid=0)\nroot@ip-10-0-10-1:\/var\/log# head -n 20 auth.log.1\n\nAug  1 07:40:47 linux-rz sshd[7461]: Invalid user test1 from 192.168.200.35 port 33874\nAug  1 07:40:48 linux-rz sshd[7461]: pam_unix(sshd:auth): check pass; user unknown\nAug  1 07:40:48 linux-rz sshd[7461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.168.200.35\nAug  1 07:40:50 linux-rz sshd[7461]: Failed password for invalid user test1 from 192.168.200.35 port 33874 ssh2\nAug  1 07:40:52 linux-rz sshd[7461]: Connection closed by invalid user test1 192.168.200.35 port 33874 [preauth]\nAug  1 07:40:58 linux-rz sshd[7465]: Invalid user test2 from 192.168.200.35 port 51640\nAug  1 07:41:01 linux-rz sshd[7465]: pam_unix(sshd:auth): check pass; user unknown\nAug  1 07:41:01 linux-rz sshd[7465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.168.200.35\nAug  1 07:41:04 linux-rz sshd[7465]: Failed password for invalid user test2 from 192.168.200.35 port 51640 ssh2\nAug  1 07:41:07 linux-rz sshd[7465]: Connection closed by invalid user test2 192.168.200.35 port 51640 [preauth]\nAug  1 07:41:09 linux-rz sshd[7468]: Invalid user test3 from 192.168.200.35 port 48168\nAug  1 07:41:11 linux-rz sshd[7468]: pam_unix(sshd:auth): check pass; user unknown\nAug  1 07:41:11 linux-rz sshd[7468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.168.200.35\nAug  1 07:41:13 linux-rz sshd[7468]: Failed password for invalid user test3 from 192.168.200.35 port 48168 ssh2\nAug  1 07:41:19 linux-rz sshd[7468]: Connection closed by invalid user test3 192.168.200.35 port 48168 [preauth]\nAug  1 07:42:30 linux-rz sshd[7471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.168.200.32  user=root\nAug  1 07:42:32 linux-rz sshd[7471]: Failed password for root from 192.168.200.32 port 51888 ssh2\nAug  1 07:42:33 linux-rz sshd[7471]: Connection closed by authenticating user root 192.168.200.32 port 51888 [preauth]\nAug  1 07:42:49 linux-rz sshd[7288]: Received disconnect from 192.168.200.2 port 54682:11: disconnected by user<\/code><\/pre>\n<p>\u7b2c\u4e00\u4e2a\u77ed\u7684\u6587\u4ef6\uff0c\u4e00\u770b\u5c31\u662f\u6211\u672c\u5730\u767b\u9646\u7684\u8bb0\u5f55\uff0c\u6240\u4ee5\u770b<code>\/var\/log\/auth.log.1<\/code><\/p>\n<pre><code class=\"language-bash\">root@ip-10-0-10-1:\/var\/log# cat auth.log.1 | grep -a &quot;Failed password for root&quot; | awk &#039;{print $11}&#039; | sort | uniq -c\n      4 192.168.200.2\n      1 192.168.200.31\n      1 192.168.200.32<\/code><\/pre>\n<p>\u6545flag\u4e3a\uff1a<\/p>\n<pre><code class=\"language-text\">flag{192.168.200.2,192.168.200.31,192.168.200.32}<\/code><\/pre>\n<h2>ssh\u7206\u7834\u6210\u529f\u767b\u9646\u7684IP\u662f\u591a\u5c11<\/h2>\n<blockquote>\n<p>ssh\u7206\u7834\u6210\u529f\u767b\u9646\u7684IP\u662f\u591a\u5c11\uff0c\u5982\u679c\u6709\u591a\u4e2a\u4f7f\u7528&quot;,&quot;\u5206\u5272<\/p>\n<\/blockquote>\n<pre><code class=\"language-bash\">root@ip-10-0-10-1:\/var\/log# cat auth.log.1 | grep -a &quot;Accepted password for root&quot; | awk &#039;{print $11}&#039; | sort | uniq -c\n      2 192.168.200.2<\/code><\/pre>\n<p>\u6545flag\u4e3a\uff1a<\/p>\n<pre><code class=\"language-text\">flag{192.168.200.2}<\/code><\/pre>\n<h2>\u7206\u7834\u7528\u6237\u540d\u5b57\u5178\u662f\u4ec0\u4e48\uff1f<\/h2>\n<blockquote>\n<p>\u7206\u7834\u7528\u6237\u540d\u5b57\u5178\u662f\u4ec0\u4e48\uff1f\u5982\u679c\u6709\u591a\u4e2a\u4f7f\u7528&quot;,&quot;\u5206\u5272<\/p>\n<\/blockquote>\n<pre><code class=\"language-bash\">root@ip-10-0-10-1:\/var\/log# cat auth.log.1 | grep &quot;Failed password for&quot;\nBinary file (standard input) matches\nroot@ip-10-0-10-1:\/var\/log# cat auth.log.1 | grep -a &quot;Failed password for&quot;\nAug  1 07:40:50 linux-rz sshd[7461]: Failed password for invalid user test1 from 192.168.200.35 port 33874 ssh2\nAug  1 07:41:04 linux-rz sshd[7465]: Failed password for invalid user test2 from 192.168.200.35 port 51640 ssh2\nAug  1 07:41:13 linux-rz sshd[7468]: Failed password for invalid user test3 from 192.168.200.35 port 48168 ssh2\nAug  1 07:42:32 linux-rz sshd[7471]: Failed password for root from 192.168.200.32 port 51888 ssh2\nAug  1 07:46:41 linux-rz sshd[7475]: Failed password for invalid user user from 192.168.200.2 port 36149 ssh2\nAug  1 07:46:47 linux-rz sshd[7478]: Failed password for invalid user user from 192.168.200.2 port 44425 ssh2\nAug  1 07:46:50 linux-rz sshd[7480]: Failed password for invalid user user from 192.168.200.2 port 38791 ssh2\nAug  1 07:46:54 linux-rz sshd[7482]: Failed password for invalid user user from 192.168.200.2 port 37489 ssh2\nAug  1 07:46:56 linux-rz sshd[7484]: Failed password for invalid user user from 192.168.200.2 port 35575 ssh2\nAug  1 07:46:59 linux-rz sshd[7486]: Failed password for invalid user hello from 192.168.200.2 port 35833 ssh2\nAug  1 07:47:02 linux-rz sshd[7489]: Failed password for invalid user hello from 192.168.200.2 port 37653 ssh2\nAug  1 07:47:04 linux-rz sshd[7491]: Failed password for invalid user hello from 192.168.200.2 port 37917 ssh2\nAug  1 07:47:08 linux-rz sshd[7493]: Failed password for invalid user hello from 192.168.200.2 port 41957 ssh2\nAug  1 07:47:10 linux-rz sshd[7495]: Failed password for invalid user hello from 192.168.200.2 port 39685 ssh2\nAug  1 07:47:13 linux-rz sshd[7497]: Failed password for root from 192.168.200.2 port 34703 ssh2\nAug  1 07:47:18 linux-rz sshd[7499]: Failed password for root from 192.168.200.2 port 46671 ssh2\nAug  1 07:47:20 linux-rz sshd[7501]: Failed password for root from 192.168.200.2 port 39967 ssh2\nAug  1 07:47:22 linux-rz sshd[7503]: Failed password for root from 192.168.200.2 port 46647 ssh2\nAug  1 07:47:26 linux-rz sshd[7525]: Failed password for invalid user  from 192.168.200.2 port 37013 ssh2\nAug  1 07:47:30 linux-rz sshd[7528]: Failed password for invalid user  from 192.168.200.2 port 37545 ssh2\nAug  1 07:47:32 linux-rz sshd[7530]: Failed password for invalid user  from 192.168.200.2 port 39111 ssh2\nAug  1 07:47:35 linux-rz sshd[7532]: Failed password for invalid user  from 192.168.200.2 port 35173 ssh2\nAug  1 07:47:39 linux-rz sshd[7534]: Failed password for invalid user  from 192.168.200.2 port 45807 ssh2\nAug  1 07:52:59 linux-rz sshd[7606]: Failed password for root from 192.168.200.31 port 40364 ssh2\nroot@ip-10-0-10-1:\/var\/log# cat auth.log.1 | grep -a &quot;Failed password for&quot; | awk &#039;{print $9 $11}&#039;  | sort | uniq -c | sort -\nnr\n      5 invaliduser\n      5 invalidhello\n      5 invalidfrom\n      4 root192.168.200.2\n      1 root192.168.200.32\n      1 root192.168.200.31\n      1 invalidtest3\n      1 invalidtest2\n      1 invalidtest1<\/code><\/pre>\n<p>\u6545flag\u4e3a\uff1a<\/p>\n<pre><code class=\"language-text\">flag{user,hello,root,test3,test2,test1}<\/code><\/pre>\n<p>\u5b98\u65b9\u4f7f\u7528perl\u8fdb\u884c\u4e86\u89e3\u7b54\uff0c\u5f88\u4f18\u96c5\uff1a<\/p>\n<pre><code class=\"language-bash\">root@ip-10-0-10-1:\/var\/log# cat auth.log.1 | grep -a &quot;Failed password&quot; | perl -e &#039;while($_=&lt;&gt;){ \/for(.*?) from\/; print &quot;$1\\n&quot;;}&#039;| uniq -c | sort -nr\n      5  invalid user user\n      5  invalid user hello\n      5  invalid user\n      4  root\n      1  root\n      1  root\n      1  invalid user test3\n      1  invalid user test2\n      1  invalid user test1<\/code><\/pre>\n<ul>\n<li><code>perl -e &#039;while($_=&lt;&gt;){ \/for(.*?) from\/; print &quot;$1\\n&quot;;}&#039;<\/code>: \u8fd9\u4e00\u90e8\u5206\u4f7f\u7528 Perl \u811a\u672c\u3002<code>-e<\/code> \u9009\u9879\u8868\u793a\u5728\u547d\u4ee4\u884c\u4e2d\u63d0\u4f9b\u811a\u672c\u4ee3\u7801\u3002Perl \u811a\u672c\u7684\u4f5c\u7528\u662f\u904d\u5386\u6bcf\u4e00\u884c\uff0c\u7136\u540e\u4f7f\u7528\u6b63\u5219\u8868\u8fbe\u5f0f <code>\/for(.*?) from\/<\/code> \u6355\u83b7\u62ec\u53f7\u4e2d\u7684\u5185\u5bb9\uff0c\u5373\u767b\u5f55\u5931\u8d25\u7684\u7528\u6237\u540d\u3002\u6355\u83b7\u7684\u5185\u5bb9\u7531 <code>$1<\/code> \u5f15\u7528\uff0c\u7136\u540e\u901a\u8fc7 <code>print &quot;$1\\n&quot;;<\/code> \u6253\u5370\u51fa\u6765\uff0c\u6bcf\u4e2a\u7528\u6237\u540d\u5360\u4e00\u884c\u3002<\/li>\n<li><code>sort -nr<\/code>: \u8be5\u90e8\u5206\u4f7f\u7528 <code>sort -nr<\/code> \u547d\u4ee4\u5bf9\u8ba1\u6570\u7ed3\u679c\u8fdb\u884c\u6392\u5e8f\uff0c\u5176\u4e2d <code>-n<\/code> \u8868\u793a\u6309\u6570\u5b57\u987a\u5e8f\u6392\u5e8f\uff0c<code>-r<\/code> \u8868\u793a\u9006\u5e8f\uff08\u4ece\u9ad8\u5230\u4f4e\uff09\u6392\u5e8f\u3002<\/li>\n<\/ul>\n<h2>\u767b\u9646\u6210\u529f\u7684IP\u5171\u7206\u7834\u4e86\u591a\u5c11\u6b21<\/h2>\n<pre><code class=\"language-bash\">root@ip-10-0-10-1:\/var\/log# cat auth.log.1 | grep -a &quot;Failed password for root&quot; | awk &#039;{print $11}&#039; | sort -n | uniq -c\n      4 192.168.200.2\n      1 192.168.200.31\n      1 192.168.200.32<\/code><\/pre>\n<p><code>192.168.200.2<\/code>\u767b\u5f55\u6210\u529f\u4e86\uff0c\u7206\u7834\u4e86\u56db\u6b21\u3002\u6545flag\u4e3a\uff1a<\/p>\n<pre><code class=\"language-text\">flag{4}<\/code><\/pre>\n<h2>\u9ed1\u5ba2\u767b\u9646\u4e3b\u673a\u540e\u65b0\u5efa\u4e86\u4e00\u4e2a\u540e\u95e8\u7528\u6237\uff0c\u7528\u6237\u540d\u662f\u591a\u5c11<\/h2>\n<pre><code class=\"language-bash\">root@ip-10-0-10-1:\/var\/log# cat auth.log.1 |grep -a &quot;\/bin&quot;\nAug  1 07:50:45 linux-rz useradd[7551]: new user: name=test2, UID=1000, GID=1000, home=\/home\/test2, shell=\/bin\/sh\nAug  1 08:18:27 ip-172-31-37-190 useradd[487]: new user: name=debian, UID=1001, GID=1001, home=\/home\/debian, shell=\/bin\/bash\nAug  1 08:18:27 ip-172-31-37-190 sudo:     root : TTY=unknown ; PWD=\/ ; USER=root ; COMMAND=\/usr\/bin\/touch \/var\/log\/aws114_ssm_agent_installation.log\nroot@ip-10-0-10-1:\/var\/log# cat auth.log.1 | grep -a &quot;\/bin\/&quot; | grep &quot;sh&quot;\nAug  1 07:50:45 linux-rz useradd[7551]: new user: name=test2, UID=1000, GID=1000, home=\/home\/test2, shell=\/bin\/sh\nAug  1 08:18:27 ip-172-31-37-190 useradd[487]: new user: name=debian, UID=1001, GID=1001, home=\/home\/debian, shell=\/bin\/bash<\/code><\/pre>\n<p>\u6216\u8005\u4f7f\u7528\uff1a<\/p>\n<pre><code class=\"language-bash\">root@ip-10-0-10-1:\/var\/log# cat \/var\/log\/auth.log.1 | grep -a &quot;new user&quot;\nAug  1 07:50:45 linux-rz useradd[7551]: new user: name=test2, UID=1000, GID=1000, home=\/home\/test2, shell=\/bin\/sh\nAug  1 08:18:27 ip-172-31-37-190 useradd[487]: new user: name=debian, UID=1001, GID=1001, home=\/home\/debian, shell=\/bin\/bash<\/code><\/pre>\n<p>\u53d1\u73b0\u786e\u5b9e\u6dfb\u52a0\u4e86\u7528\u6237<code>test2<\/code><\/p>\n<pre><code class=\"language-bash\">root@ip-10-0-10-1:\/var\/log# cat \/etc\/passwd | grep -v &quot;nologin&quot; | grep &quot;sh&quot;\nroot:x:0:0:root:\/root:\/bin\/bash\ntest2:x:1000:1000::\/home\/test2:\/bin\/sh\ndebian:x:1001:1001:Debian:\/home\/debian:\/bin\/bash\nroot@ip-10-0-10-1:\/var\/log# ls -la \/home\ntotal 12\ndrwxr-xr-x  3 root   root   4096 Aug  1  2023 .\ndrwxr-xr-x 18 root   root   4096 Jun 14 11:55 ..\ndrwxr-xr-x  3 debian debian 4096 Aug  1  2023 debian\nroot@ip-10-0-10-1:\/# cat \/etc\/shadow\nroot:$6$V5ItX87cUllL5G4h$yATBAGCLFnkAoW4erj4cBGT9mXg3kdqkItr8xX.64LJwsq48qDeukrTkOwoTE6TSYnaTDfSRvpWiq\/BIMmhom\/:19570:0:99999:7:::\ndaemon:*:19314:0:99999:7:::\nbin:*:19314:0:99999:7:::\nsys:*:19314:0:99999:7:::\nsync:*:19314:0:99999:7:::\ngames:*:19314:0:99999:7:::\nman:*:19314:0:99999:7:::\nlp:*:19314:0:99999:7:::\nmail:*:19314:0:99999:7:::\nnews:*:19314:0:99999:7:::\nuucp:*:19314:0:99999:7:::\nproxy:*:19314:0:99999:7:::\nwww-data:*:19314:0:99999:7:::\nbackup:*:19314:0:99999:7:::\nlist:*:19314:0:99999:7:::\nirc:*:19314:0:99999:7:::\ngnats:*:19314:0:99999:7:::\nnobody:*:19314:0:99999:7:::\n_apt:*:19314:0:99999:7:::\nsystemd-timesync:*:19314:0:99999:7:::\nsystemd-network:*:19314:0:99999:7:::\nsystemd-resolve:*:19314:0:99999:7:::\nmessagebus:*:19314:0:99999:7:::\nunscd:*:19314:0:99999:7:::\nntp:*:19314:0:99999:7:::\nsshd:*:19314:0:99999:7:::\nsystemd-coredump:!!:19322::::::\ntest2:$6$oIpMwQHVAWKNjsi1$kMV6ZNSOTZfqnNSxqMkl9tLj\/1Y5KOJMZBzCu.qQgFxezvXrn..gHkt8lieFTDVCUI0PhVASNpZvKCJwsN3gH1:19570:0:99999:7:::\ndebian:!:19570:0:99999:7:::<\/code><\/pre>\n<p>\u6240\u4ee5flag\u4e3a\uff1a<\/p>\n<pre><code class=\"language-bash\">flag{test2}<\/code><\/pre>\n","protected":false},"excerpt":{"rendered":"<p>\u7b2c\u4e00\u7ae0 \u5e94\u6025\u54cd\u5e94-Linux\u65e5\u5fd7\u5206\u6790 \u57fa\u7840\u4fe1\u606f\u641c\u96c6 hgbe02@pwn:~\/temp$ ssh root@6 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,24],"tags":[],"class_list":["post-692","post","type-post","status-publish","format-standard","hentry","category-ctf-and-protest","category-penetration-test"],"_links":{"self":[{"href":"http:\/\/162.14.82.114\/index.php\/wp-json\/wp\/v2\/posts\/692","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/162.14.82.114\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/162.14.82.114\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/162.14.82.114\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/162.14.82.114\/index.php\/wp-json\/wp\/v2\/comments?post=692"}],"version-history":[{"count":1,"href":"http:\/\/162.14.82.114\/index.php\/wp-json\/wp\/v2\/posts\/692\/revisions"}],"predecessor-version":[{"id":693,"href":"http:\/\/162.14.82.114\/index.php\/wp-json\/wp\/v2\/posts\/692\/revisions\/693"}],"wp:attachment":[{"href":"http:\/\/162.14.82.114\/index.php\/wp-json\/wp\/v2\/media?parent=692"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/162.14.82.114\/index.php\/wp-json\/wp\/v2\/categories?post=692"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/162.14.82.114\/index.php\/wp-json\/wp\/v2\/tags?post=692"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}