PicoCTF - VNE
Background
System Environment Command Injection
Description & Hint
We’ve got a binary that can list directories as root, try it out !! ssh to saturn.picoctf.net:53176, and run the binary named “bin” once connected. Login as ctf-player with the password, d137d16e
- Hint 1: Have you checked the content of the /root folder
- Hint 2: Find a way to add more instructions to the ls
Source Code
:::spoiler IDA Main Function
1 |
|
:::
Recon
這一題也是蠻有趣的,題目有說要先執行bin,可以用winscp遠端把執行檔dump到local端,然後用IDA逆一下,就會發現它其實就是執行ls而已,所以我們就要用簡單的command injection達到RCE
Exploit
1 |
|
Flag: picoCTF{Power_t0_man!pul4t3_3nv_19a6873b}