扫描ip:

获得靶机的ip:192.168.108.134
扫描端口:

获得80端口,7223的ssh和一个ftp服务器服务器中存在两个文件:
先看ftp:
默认用户名为ftp:

下载两个文件:

和

打开flag1.txt:

获得第一个flag:
打开word:

是一串密码
查看一下http服务:

访问网址:
没有什么东西
爆破一下目录:

发现robots.txt,但是也是没有什么
尝试使用其它的字典进行爆破

爆破出一个happy:

查看源代码:

发现用户名:hackathonll
尝试ssh爆破:

爆破成功
进行ssh登录:

登录成功,开启shell:

查看sudo权限:

发现vim可以进行提权:sudo vim


获得root权限:

获得flag2