🌌
N/B Writeups
  • CTF Writeups
  • CTFs
    • 2019
      • OverTheWire Advent
    • 2020
      • Midnight Sun
      • Things I learned from DarkCTF
  • Pwnable.kr
    • 01 - fd
    • 02 - col
    • 03 - bof
    • 04 - flag
    • 05 - passcode
    • 06 - random
    • 07 - input
    • 08 - leg
    • 09 - mistake
    • 10 - Shellshock
    • 11 - coin1
    • 12 - blackjack
    • 13 - lotto
    • 14 - cmd1
    • 15 - cmd2
    • 16 - uaf
    • 17 - memcpy
    • 18 - asm
    • 20 - blukat
    • 21 - horcruxes
    • 33 - echo1
    • 34 - echo2
    • 43 - coin2
  • More Pwn
    • Protostar - format4
  • Lord of SQLI
    • Lord of SQLI
Powered by GitBook
On this page
  • The Challenge
  • The Solution

Was this helpful?

  1. Pwnable.kr

20 - blukat

Previous18 - asmNext21 - horcruxes

Last updated 4 years ago

Was this helpful?

The Challenge

Sometimes, pwnable is strange... hint: if this challenge is hard, you are a skilled player.

ssh blukat@pwnable.kr -p2222 (pw: guest)

The Solution

This challenge is about paying attention and questioning reality itself.

At first glance everything is as usual:

Only members of blukat_pwn can access the password which we need to get the flag. As we started analyzing the challenge we had some opportunities to figure out something was wrong. For example:

  • How did we just copy the password file to my local machine?

  • Why fgets stores in memory "cat: password: Permission denied" ?

Take a close look at blukat's group permissions:

We are part of the blukat_pwn group, and that permission denied string is the password!

Use this to grab the flag and get this over with.