Rating: 4.0

In this challenge we are required to execute a simple command in a reduced bash in order to obtain the flag.
Below you can see the output of the help command which displays the command we want to execute and also which characters are banned from usage.

The bash can be reached via nc 35.189.118.225 1337

![Imgur](https://i.imgur.com/QmYnl3a.png)

Our first intuition was that we need to encode the command in some way or another. We did not think of capital letters, as the other writeup suggests. D'oh!

So we encode our command in octal representation since there is no alphabetical letter needed (in contrast to hex encoding). The encoded command is stored in a variable in the first step and finally executed in a second step.

After executing the octal representation of /get_flag we learn that we also need to pass the parameter gimme_FLAG_please in order to receive the flag. Below our full command, /get_flag gimme_FLAG_please:


__=$'\057\147\145\164\137\146\154\141\147\040\147\151\155\155\145\137\106\114\101\107\137\160\154\145\141\163\145';$__


Note that the variable could also be a capital letter. But why take the easy path, if there is a more complicated one? Anyways, here's the result:

## 34C3_LoOks_lik3_y0U_are_nO_b4by_4ft3r_4ll