Skip to main content

Command Palette

Search for a command to run...

Nebula - 00

Updated
1 min read
Nebula - 00

After a long break from posting something, I’m pleased to start the new series - Exploit Development.

I decided to start with the Nebula challenge from exploit.education.

The idea is to walk through and document my journey in the order NebulaPhoenixFusion.

Getting started

To get started you need to download a Nebula .iso file, you can find it here.

I’m currently running the live version of that VM. To log in, you can use nebula/nebula as credentials.

To access the first level, log in as level00 with the password of level00. For the sake of usability, I ssh to the machine as that user. The objective of the first level is to find the binary with the SUID bit set.

Finding the flag

To find that binary we will use the find command.

level00@nebula:/home/level00$ cd ~
level00@nebula:~$ find / -u=s 2>/dev/null | grep flag*

/ will start the search in the root directory

-perm will look for specific permissions for the file

-u=s will find only files with the SUID bit set

2>/dev/null redirecting all the errors to /dev/null to have a readable output

| grep flag* to display only results that start with the flag in the name

our find command will find a binary located in /bin/.../level00, let’s run it:

level00@nebula:~$ find / -perm -u=s 2>/dev/null | grep flag*
/bin/.../flag00
/rofs/bin/.../flag00

level00@nebula:~$ /bin/.../flag00 
Congrats, now run getflag to get your flag!

flag00@nebula:~$ getflag 
You have successfully executed getflag on a target account

flag00@nebula:~$ id
uid=999(flag00) gid=1001(level00) groups=999(flag00),1001(level00)

Nebula

Part 14 of 14

Nebula takes the participant through a variety of common vulnerabilities in Linux. At the end of Nebula, the user will have a thorough understanding of local attacks against Linux systems.

Start from the beginning

Nebula - 15

Objective strace the binary at /home/flag15/flag15 and see if you spot anything out of the ordinary. You may wish to review how to “compile a shared library in linux” and how the libraries are loaded and processed by reviewing the dlopen manpage in ...

More from this blog

H

Hacking For Ramen

41 posts

Journey from Zero to Hero. Pentest, RE, ExploitDev, Malware Analysis.