Chainsaw

Very nice box, except the last piece, over complicating things IMHO. The idea is very fresh and funny to learn.

  • User : There are some APIs to play with it in several languages. After fighting a lot I used R**** IDE and works perfectly. Then, there is a very common vulnerability but with a different approach.
    After that, enumerate a bit and pay attention to some information that is in front of your eyes. It will give you a hint to what to search.

  • Root: The first path is not hard, just need some interaction. After that, the crazy enumeration comes in place. Thanks @CyberMnemosyne to give me a little hint. To make it easier I suggest to pay attention to this two comments:

@alamot

I think this root flag bends a little the rule that the flag have to be inside /root/root.txt … Well, it is not exactly inside but it is very close.

@will135

For those stuck on the last step… don’t slack off and keep trying

Congrats @artikrh and @absolutezero :slight_smile: I enjoyed it