inframedium

System Persistence

hackerlab

Task: a compromised Linux server exposes SSH and a defaced web page, while /server/token.txt only reveals rotating token fragments. Solution: enumerate temporary SGID binaries owned by group hacker, preserve egid=hacker through a working wrapper, access /home/hacker/userkick, and kick the attacker account to print the real flag.

$ ls tags/ techniques/
linux_enumerationsgid_group_abuseeffective_group_preservationservice_reconnaissance

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub to get started.

$ssh [email protected]