question
1 2 3 4 5 6 7 8 9
| We all make mistakes, let's move on. (don't take this too seriously, no fancy hacking skill is required at all)
This task is based on real event Thanks to dhmonkey
hint : operator priority
ssh mistake@pwnable.kr -p2222 (pw:guest)
|
题目要求我们使用ssh登录到服务器上ssh mistake@pwnable.kr -p2222
,密码是guest
,有的时候可能有身份的校验,这个时候需要加上参数-o StrictHostKeyChecking=no
进行登录
mistake.c
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50
| #include <stdio.h> #include <fcntl.h>
#define PW_LEN 10 #define XORKEY 1
void xor(char* s, int len){ int i; for(i=0; i<len; i++){ s[i] ^= XORKEY; } }
int main(int argc, char* argv[]){ int fd; if(fd=open("/home/mistake/password",O_RDONLY,0400) < 0){ printf("can't open password %d\n", fd); return 0; }
printf("do not bruteforce...\n"); sleep(time(0)%20);
char pw_buf[PW_LEN+1]; int len; if(!(len=read(fd,pw_buf,PW_LEN) > 0)){ printf("read error\n"); close(fd); return 0; }
char pw_buf2[PW_LEN+1]; printf("input password : "); scanf("%10s", pw_buf2);
// xor your input xor(pw_buf2, 10);
if(!strncmp(pw_buf, pw_buf2, PW_LEN)){ printf("Password OK\n"); system("/bin/cat flag\n"); } else{ printf("Wrong Password\n"); }
close(fd); return 0; }
|
analyse
只是两次输入异或操作然后比较?
输入0000000000
再输入11111111111
即可
get flag
1 2 3 4 5 6
| mistake@ubuntu:~$ ./mistake do not bruteforce... 0000000000 input password : 1111111111 Password OK Mommy, the operator priority always confuses me :(
|
flag
:Mommy, the operator priority always confuses me :(