Dr. Brian Robert Callahan
academic, developer, with an eye towards a brighter techno-social life
In order to do good work on my own cybersecurity teaching platform, I should learn how others do it. TryHackMe was recently brought to my attention, so I signed up to see what it might offer. I will be posting solutions here so spoilers ahead!
The Learn Linux room only has one "real" flag, Task 43. Here is how I solved it:
shiba4 user and immediately tried to sudo cat /root/root.txt. But shiba4 wasn't in the sudoers file. So I tried the shiba3, shiba2, and shiba1 users, none of which were in the sudoers file.ls /home to see what other users there might be. There is a noot and a nootnoot user. So I chose nootnoot to start and looked in their /home directory with ls -a. There was a hidden file .sudo_as_admin_successful so I figured that nootnoot might be in the sudoers file.find / -user nootnoot to see if there were any files hiding in the filesystem like we had to do for Task 33. No luck. But I remembered that each password was able to be learned from the previous user (i.e., shiba2's password was discovered with files owned by shiba1). So I re-ran find / -user shibaX, where X was replaced with 1, 2, 3, and 4. Success was found with shiba2: /var/log/test1234.su shiba2 and then cat /var/log/test1234 which informed us that the password for the nootnoot user was notsofast.su nootnoot.sudo cat /root/root.txt. What is contained in that file is the flag. :)