diff --git a/content/posts/htb-instant-writeup/index.en.md b/content/posts/htb-instant-writeup/index.en.md index ed2c114..a7164be 100644 --- a/content/posts/htb-instant-writeup/index.en.md +++ b/content/posts/htb-instant-writeup/index.en.md @@ -104,7 +104,7 @@ Once you download the Solar-PuTTY session-cracking tool of your choice, exfiltra {{}} -As you can see here, we have plaintext access to the root password of the machine, so now we can go back to our SSH session as "shirohige", execute `su -` and use try the password we found in the Solar-PuTTY session: +As you can see here, we have plaintext access to the root password of the machine, so now we can go back to our SSH session as "shirohige", execute `su -` and try the password we found in the Solar-PuTTY session: {{}} diff --git a/content/posts/htb-instant-writeup/index.md b/content/posts/htb-instant-writeup/index.md index 954f167..038236b 100644 --- a/content/posts/htb-instant-writeup/index.md +++ b/content/posts/htb-instant-writeup/index.md @@ -104,7 +104,7 @@ Una vez descarguéis la herramienta de descifrado de sesiones Solar-PuTTY de vue {{}} -Como podéis ver aquí, tenemos acceso en texto plano a la contraseña de root de la máquina, por lo que ahora podemos volver a nuestra sesión SSH como "shirohige", ejecutar 'su -' y usar probar la contraseña que encontramos en la sesión de Solar-PuTTY: +Como podéis ver aquí, tenemos acceso en texto plano a la contraseña de root de la máquina, por lo que ahora podemos volver a nuestra sesión SSH como "shirohige", ejecutar 'su -' y probar la contraseña que encontramos en la sesión de Solar-PuTTY: {{}}