Exploit-Exercises Nebula level08

World readable files strike again. Check what that user was up to, and use it to log into flag08 account.

To do this level, log in as the level08 account with the password level08. Files for this level can be found in /home/flag08.

Pcap (Packet Capture) file holds the network activity history. Using the tcpflow command, we will read the pcap file with -r option and output the result to console with -c option.

We notice some interesting activity with password input. The user inputs backdoor...00Rm8.ate. I made an assumption that the . represents backspace. So the correct password would be backd00Rmate.

This is an image