For each challenge in this module, a different (standard) program that is owned by root has its suid
bit set.
Probably, this program is not normally designed to be suid
.
Your task is to misuse the program with this increased privilege to read the flag.
Some of these programs are ordinarily used to read files; several of them are not.
In order to better understand how to use (and misuse) these programs, you may want to read through their man
pages.
Lectures and Reading
Challenges
30-Day Scoreboard:
This scoreboard reflects solves for challenges in this module after the module launched in this dojo.
Rank | Hacker | Badges | Score |