miscPromedium

Touch

HackTheBox

The target server on port 30678 runs `socat`, which provides a bash shell as user `ctf` (uid=1000). The flag is located at `/root/flag.txt`, accessible only by root. Privilege escalation is required.

$ ls tags/ techniques/
suid_exploitationld_preload_hijackingshared_library_injectionumask_manipulation

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups