Glad to hear that you are in. bot2
has been sent to release some malicious files in a few days. Can you find and check it?
The Linux challenges are consecutive, starting from part 1.
First, we must log in to bot2
, using the previous flag as the password, and then change directory to bot2
's home directory:
bot1@cybot01:~$ su bot2
Password:
bot2@cybot01:/home/bot1$ cd ~
Let's see what files there are here:
bot2@cybot01:~$ ls
At first glance, there aren't any files. However, let's see if there's anything hidden:
bot2@cybot01:~$ ls -a
. '.#flag$!!1' .. .bash_history .bash_logout .bashrc .profile
Aha! A hidden file.
At this point, I could have done ls -la
to list all the files and their permissions – it slipped my mind to check those during the CTF, and I jumped straight to executing the flag file. (I'm guessing it would have only execute permissions and no read/write perms for bot2
.)
Update: Nevermind, it actually had read/write/execute permissions for everyone 🤦♂️ good job.
bot2@cybot01:~$ ls -la
total 40
dr-xr-x--- 2 root bot2 4096 Jun 18 09:51 .
-rwxrwxrwx 1 bot2 root 16752 Jun 18 09:51 '.#flag$!!1'
drwxr-xr-x 10 root bot5 4096 Jun 18 09:51 ..
lrwxrwxrwx 1 root root 9 Jun 18 09:51 .bash_history -> /dev/null
-r--r----- 1 bot2 bot2 220 Feb 25 2020 .bash_logout
-r--r----- 1 bot2 bot2 3771 Feb 25 2020 .bashrc
-r--r----- 1 bot2 bot2 807 Feb 25 2020 .profile
Anyways, upon executing the file, we get the flag.
bot2@cybot01:~$ ./'.#flag$!!1'
CDDC21{TH4nKsF0R_p3RM}
CDDC21{TH4nKsF0R_p3RM}