For each challenge in this module, a different (standard) program that is owned by root has its suid
bit set.
Probably, this program is not normally designed to be suid
.
Your task is to misuse the program with this increased privilege to read the flag.
Some of these programs are ordinarily used to read files; several of them are not.
In order to better understand how to use (and misuse) these programs, you may want to read through their man
pages.
Challenges
30-Day Scoreboard:
This scoreboard reflects solves for challenges in this module after the module launched in this dojo.
Rank | Hacker | Badges | Score |