Nebula - 00
Hacking For Ramen> Intro

After a long break from posting anything I’m pleased to start the new series - Exploit Development.
I decided to start with the Nebula challenge from exploit.education.
The idea is to walk through and document my journey in the order Nebula ⇾ Phoenix → Fusian.
> Getting started
To get started you need to download a Nebula .iso file, you can find it here.
I’m currently running the live version of that VM. To login, you can use nebula/nebula as credentials.
To access the first level, log in as level00 with the password of level00. For the sake of usability I ssh to the machine as that user. The objective of the first level is to find the binary with the SUID bit set.
> Finding the flag
To find that binary we will use the find command.
level00@nebula:/home/level00$ cd ~ level00@nebula:~$ find / -u=s 2>/dev/null | grep flag*
/ will start the search in the root directory
-perm will look for specific permissions for the file
-u=s will find only files with SUID bit set
2>/dev/null redirecting all the errors to /dev/null to have a readable output
| grep flag* to display only results that start with the flag in the name
our find command will find a binary located in /bin/.../level00, let’s run it:
level00@nebula:~$ find / -perm -u=s 2>/dev/null | grep flag* /bin/.../flag00 /rofs/bin/.../flag00 level00@nebula:~$ /bin/.../flag00 Congrats, now run getflag to get your flag! flag00@nebula:~$ getflag You have successfully executed getflag on a target account flag00@nebula:~$ id uid=999(flag00) gid=1001(level00) groups=999(flag00),1001(level00)