Introduction
Hello, everyone! Today, I’ll guide you through Level 01 of the SnowCrash project in the 42 cyber-security curriculum. Let’s dive in!
Enumeration
Once you’re logged in, it’s time to enumerate the system for useful information. One of the first files to check is /etc/passwd
, which lists all user accounts on the system. Let’s examine this file:
1 | cat /etc/passwd |
Here is the relevant section of the output:
1 | level11:x:2011:2011::/home/user/level11:/bin/bash |
The 42hDRfypTqqnw
is the hashed password for the flag01
user. We need to crack this hash to proceed.
Cracking the Hash
We can use tools like john
(John the Ripper) to crack the password hash. First, save the hash to a file:
file:
1 | echo "42hDRfypTqqnw" > hash |
Next, use john
to crack the hash:
1 | john hash |
John will process the hash and attempt to crack it using its default wordlist.
After a short time, you should see output similar to this:
1 | Using default input encoding: UTF-8 |
The password for flag01
is revealed to be abcdefg
.
Now, use this password to switch to the flag01
user and get the flag ;)