(844) 627-8267 | Info@NationalCyberSecurity
(844) 627-8267 | Info@NationalCyberSecurity

100 Days of hacking: Day 6 — A Rick and Morty, Pickle Rick CTF Challenge | by Ibrahim Abdulhaqq | Sep, 2023 | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker


5. Exploring Discovered Files:
— Visit the `robots.txt` file, which contains the text: **Wubbalubbadubdub**.

— Access the `login.php` file, which appears to be the login page for Rick’s computer.

Gaining Access and Exploring Rick’s Computer

6. Logging In to the Portal:
— Use the username `R1ckRul3s` and the password `Wubbalubbadubdub` to successfully log in to the portal.

— You’ll find yourself in the `portal.php` file, which provides a command-line interface.

7. Investigating Files:
— Perform a file listing using `ls -la` in the command line to explore the files in the directory.
— Two files catch your attention: `Sup3rS3cretPickl3Ingred.txt` and `clue.txt`.

8. Discovering the First Ingredient:
— Open `Sup3rS3cretPickl3Ingred.txt` to find the first ingredient: mr. meeseek hair.

9. Following the Clue:
— Examine `clue.txt`, which hints: “Look around the file system for the other ingredient.”

— Begin exploring the file system for the next ingredient.

Exploring the File System

10. Navigating the File System:
— Move to the home directory and explore further using commands like `cd /home; ls -la`.
— Notice a directory named `rick` within the home directory.

11. Exploring the “rick” Directory:
— Enter the `rick` directory using `cd /home/rick; ls -la`.
— Inside the `rick` directory, discover the second ingredient.

12. Accessing the Second Ingredient:
— Use the `less` command to access the content of the file: `$ less “/home/rick/second ingredients”` (use quotes due to spacing).
— Obtain the second flag and ingredient: 1 flag tear.

Privilege Escalation and Obtaining the Final Ingredient

13. Back to Root Directory:
— Navigate back to the home directory and then move back a directory using: `$ cd /home; cd ..; ls -la`.
— You’ll find a directory named `root`.

14. Checking Privilege Escalation:
— Use the command: `$ sudo -l` to explore potential privilege escalation opportunities.
— Discover that any sudo command can be executed without requiring a password.

15. Exploring the Root Directory:
— Use the command: `$ sudo less /root` to list the contents of the root directory.
— Within this directory, find the third ingredient and flag.

16. Accessing the Third Ingredient:
— Use: `$ sudo less /root/3rd.txt` to

Conclusion

In the Pickle Rick CTF challenge, we embarked on a thrilling journey to exploit a web server and retrieve three secret ingredients to aid Rick’s transformation. By analyzing clues, exploring files, and leveraging tools, we successfully accessed Rick’s computer. Through careful observation and technical prowess, we uncovered valuable information and demonstrated the power of ethical hacking. As you continue your hacking journey, remember that every challenge enhances your skills and prepares you for real-world scenarios. Keep hacking and stay curious!

——————————————————–


Click Here For The Original Story From This Source.

National Cyber Security

FREE
VIEW