miscPromedium
Touch
HackTheBox
The target server on port 30678 runs `socat`, which provides a bash shell as user `ctf` (uid=1000). The flag is located at `/root/flag.txt`, accessible only by root. Privilege escalation is required.
$ ls tags/ techniques/
suid_exploitationld_preload_hijackingshared_library_injectionumask_manipulation
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [forensics][Pro]Suspicious Threat Challenge— hackthebox
- [web][Pro]local— web-kids20
- [pwn][Pro]Want the flag?— spbctf
- [pwn][Pro]read_me_not — sendfile bypass— spbctf
- [pwn][Pro]cat /flag under seccomp— spbctf