<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://wiki.netzadresse.ch/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://wiki.netzadresse.ch/feed.php">
        <title>[ wiki.netzadresse.ch ] - security:challenge</title>
        <description></description>
        <link>https://wiki.netzadresse.ch/</link>
        <image rdf:resource="https://wiki.netzadresse.ch/lib/exe/fetch.php?media=wiki:dokuwiki.svg" />
       <dc:date>2026-04-17T16:02:20+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://wiki.netzadresse.ch/doku.php?id=security:challenge:exposed_creds&amp;rev=1625320240&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.netzadresse.ch/doku.php?id=security:challenge:ssh_backdoor_2&amp;rev=1624722464&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://wiki.netzadresse.ch/lib/exe/fetch.php?media=wiki:dokuwiki.svg">
        <title>[ wiki.netzadresse.ch ]</title>
        <link>https://wiki.netzadresse.ch/</link>
        <url>https://wiki.netzadresse.ch/lib/exe/fetch.php?media=wiki:dokuwiki.svg</url>
    </image>
    <item rdf:about="https://wiki.netzadresse.ch/doku.php?id=security:challenge:exposed_creds&amp;rev=1625320240&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2021-07-03T13:50:40+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>exposed_creds</title>
        <link>https://wiki.netzadresse.ch/doku.php?id=security:challenge:exposed_creds&amp;rev=1625320240&amp;do=diff</link>
        <description>Find Garry&#039;s Password

Start Reverse Shell Listener


root@kali$
nc -l 8000


Enhance Shell

&lt;https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys/#method-3-upgrading-from-netcat-with-magic&gt;


garry@desktop$
python -c &#039;import pty; pty.spawn(&quot;/bin/bash&quot;)&#039;
Ctrl-Z
        echo $TERM
        stty -a
        stty raw -echo
fg
reset
--&gt; xterm


Enable ssh and exfiltrate</description>
    </item>
    <item rdf:about="https://wiki.netzadresse.ch/doku.php?id=security:challenge:ssh_backdoor_2&amp;rev=1624722464&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2021-06-26T15:47:44+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>ssh_backdoor_2</title>
        <link>https://wiki.netzadresse.ch/doku.php?id=security:challenge:ssh_backdoor_2&amp;rev=1624722464&amp;do=diff</link>
        <description>Find ssh Backdoor

9 Ways to backdoor a Linux Box

&lt;https://airman604.medium.com/9-ways-to-backdoor-a-linux-box-f5f83bae5a3c&gt;

Find suspicious authorized_keys File


find / -name authorized_keys 2&gt;/dev/null
/root/.ssh/authorized_keys
/boot/grub/.ssh/authorized_keys
/home/student/.ssh/authorized_keys
/home/rfadmin/.ssh/authorized_keys
/etc/skel/.ssh/authorized_keys</description>
    </item>
</rdf:RDF>
