Home [Root Me] Weak Configuration
Post
Cancel

[Root Me] Weak Configuration

We got an access via ssh:

1
ssh -p 2222 app-script-ch1@challenge02.root-me.org

When we enter with our username and password we see this in the personal directory, a file named readme.md:

1
You have to read the .passwd located in the following PATH : /challenge/app-script/ch1/ch1cracked/

Later that I do an sudo -l to see what we can execute with sudo and with what user.

1
2
3
User app-script-ch1 may run the following commands on challenge02: 

(app-script-ch1-cracked) /bin/cat /challenge/app-script/ch1/notes/*`

We see there is a same named user but cracked that can execute cat on /challenge/app-script/ch1/notes/*

Then is so easy, we just have to follow this path but replacing the * for ../ch1cracked/.passwd and we got the flag…

This post is licensed under CC BY 4.0 by the author.