Solution #
You’re given a file called warm
. Run file
on it and you’ll find that it’s an ELF file.
1
2
|
$ file resources/warm
resources/warm: ELF 64-bit LSB pie executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 3.2.0, BuildID[sha1]=01b148cdedfc38125cac0d87e0537466d47927b1, with debug_info, not stripped
|
Run ./warm
and you’ll get the following output.
1
2
|
$ ./resources/warm
Hello user! Pass me a -h to learn what I can do!
|
Run the following command to give it a right permission and run it again.
1
2
3
|
$ chmod +x resources/warm
$ ./resources/warm
Oh, help? I actually don't do much, but I do have this flag here: picoCTF{b1scu1ts_4nd_gr4vy_f0668f62}
|
Acknowledgement #
Thank you, CMU security and privacy experts, for creating this challenge.