Tags: linux
Rating:
# Flag1 and Flag2
-----
Basically flag1.txt and flag2.txt were in luciafer documents. Just move to that folder and use `cat flag1.txt`:
```
flag{cb07e9d6086d50ee11c0d968f1e5c4bf1c89418c}
```
and `cat .flag2.txt`:
```
flag{728ec98bfaa302b2dfc2f716d3de7869f3eadcbf}
```
# Flag3
-----
Then looking for SUID bit files with `find / -perm /4000 2> /dev/null` we found something funny: `/usr/local/bin/ouija`
That executable was owned by `root` and has the SUID bit set so it will be run as him. This executable will take the input and append `/root/` to it, basically to read a file from that folder. Using relatives paths we were able to read every file we want with it.
Just use `ouija ../home/spookyboi/Documents/flag3.txt` and get your flag
```
flag{445b987b5b80e445c3147314dbfa71acd79c2b67}
```
# Flag4
-----
Do you remember that `ouija` append the `/root/` string to our input? Well we tried `ouija flag4.txt` and the flag appeared
```
flag{4781cbffd13df6622565d45e790b4aac2a4054dc}
```