infraeasy
In Search of the Flag
hackerlab
Task: SSH access is provided and a flag-looking PNG in /home/user suggests an image-stego rabbit hole. Solution: enumerate the Linux host, identify NOPASSWD sudo for /usr/bin/find, and use GTFOBins-style file reads to recover the real flag from /home/r00t/flag.txt.
$ ls tags/ techniques/
linux_enumerationsudo_find_file_readgtfobins_sudo_abuse
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub to get started.
$ssh [email protected]