infraeasy

In Search of the Flag

hackerlab

Task: SSH access is provided and a flag-looking PNG in /home/user suggests an image-stego rabbit hole. Solution: enumerate the Linux host, identify NOPASSWD sudo for /usr/bin/find, and use GTFOBins-style file reads to recover the real flag from /home/r00t/flag.txt.

$ ls tags/ techniques/
linux_enumerationsudo_find_file_readgtfobins_sudo_abuse

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub to get started.

$ssh [email protected]