../
By
HN0x03 | Escalade comme un Yamakasi - Easyone
HN0x03 | 🩸 Escalade comme un Yamakasi - Easyone
This challenge is a part of the Hacky’Nov 0x03 CTF.
Goal
Read the flag at the root of the filesystem.
Walkthrough
First thing to check for thing kind of challenges is the sudo permissions:
user@d89b66f590cb:~$ sudo -l
[sudo] password for user:
Matching Defaults entries for user on d89b66f590cb:
env_reset, mail_badpass, secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin, use_pty
User user may run the following commands on d89b66f590cb:
(ALL) /bin/cat
Here, we can see that we can run the cat
command as root. Nothing more to do, we got the flag:
user@d89b66f590cb:~$ sudo cat /flag.txt
HNx03{Ok_its_maybe_to_ez}