Cyber Training Guide
IronForgeCyberHow-To: Radare2How-To: GDB
  • Cyber Training Guide
  • 0x0: Introduction
    • git-good
    • root-1
    • root-2
    • intro
  • Binary Exploitation (pwn)
    • What is Binary Exploitation?
    • 0x1: ret2win
      • win32
      • win64
      • args
    • 0x2: shellcodes
      • location
      • shell
      • constrained
    • 0x3: format strings
      • format
      • chase
      • bbpwn
    • 0x4: stack canaries
      • canary
      • findme
    • 0x5: ROP
      • rop2win
      • split
      • callme
      • write4
      • badchars
    • 0x6: PIE
      • gimme
      • leak32
      • leak64
    • 0x7: ASLR
      • groundzero
      • stepup
      • ret2plt
    • 0x8: GOT overwrites
      • gotem
      • gotem64
  • Programming
    • What is the Programming Section?
    • 0x9: Data Serialization
      • LinkedOps
      • Tree
      • TeLeVision
    • 0xA: Programming
      • Calorie Counting
      • Hash
      • Rock Paper Scissors
      • Watch the Register
      • Supply Stacks
      • Rope Bridge
      • Mountain Climbers
  • Reverse Engineering (RE)
    • What is Reverse Engineering?
    • 0xB: Ghidra
      • hardcode
      • undo
      • snake
  • Toolkit
    • Using Pwntools
      • Establishing Connection
      • Context
      • Sending/Receiving Data
      • The ELF Class
    • My Workflow
      • Tmux
      • Vim
Powered by GitBook
On this page
  • Description
  • Flag
  • Hints
  • Solution

Was this helpful?

  1. 0x0: Introduction

root-1

Navigating the Linux file system using the command line.

Category: introduction (0x0) Points: 50

Description

This flag is contained somewhere in some file. Can you find this flag?

This challenge was designed to test your ability to use the man pages to understand how functions work and successfully and efficiently navigate the Linux terminal.

Flag

flag{hope_you_didnt_solve_manually}

Hints

  1. Think about the format of the directory. What types of characters are in the files? What might not be there?

Solution

$ grep -r "flag{" .  

./YGE8xafxo1aDyyDaP64vFT5R/OYPuOaJxX4NlA2doAGOpb04y/v6nhCxEFm5Jk8xXfwi9vSEXS/i2nqw0ZUHwUy5G9udh0PqZCe/CQY19DujzCEOFWExctTxlA8e/e6kbvlh6ZCYcfTp9Yq5eJMwb:UP4APiMOtGHslVhRxPiJeYUYxTV2mJycZq7ahaO4MgjpSiflag{hope_you_didnt_solve_manually}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

grep formats results ./file:content_match.

Previousgit-goodNextroot-2

Last updated 1 year ago

Was this helpful?