Exploit 1
Description
178.63.58.69 3016
usr: ctf, pass: canyoudoit
flag in /home/flag/flag.txt
Solution
Once logged in, there’s nothing interesting found inside the .bash_history
file, although it’s good to see they’ve tried checking vulnerabilities for
example the ShellShock attack.
Likewise, we see /home/flag has no access controls present which allow us to
read, write or execute anything in the directory. All attempts at directly
reading the /home/flag/flag.txt file gave us access denied.
Looking in /bin and /sbin yields nothing, but if we perform ls -al
/usr/bin, there’s a file called ... which is owned by flag, but part of
the group ctf. It has s permissions, and when executed, it gives us a
Python shell, running as flag.
Here, it’s simple. We write a bit of python in the interpreter that opens
/home/flag/flag.txt, and prints it. The script is below:
  f = open('/home/flag/txt', 'r')
  print f     
This prints out the flag.