Solution #

You’re given a file called warm. Run file on it and you’ll find that it’s an ELF file.

1
2
$ file resources/warm
resources/warm: ELF 64-bit LSB pie executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 3.2.0, BuildID[sha1]=01b148cdedfc38125cac0d87e0537466d47927b1, with debug_info, not stripped

Run ./warm and you’ll get the following output.

1
2
$ ./resources/warm
Hello user! Pass me a -h to learn what I can do!

Run the following command to give it a right permission and run it again.

1
2
3
$ chmod +x resources/warm
$ ./resources/warm
Oh, help? I actually don't do much, but I do have this flag here: picoCTF{b1scu1ts_4nd_gr4vy_f0668f62}

Acknowledgement #

Thank you, CMU security and privacy experts, for creating this challenge.