<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Sabid Mahmud</title>
    <description>The latest articles on DEV Community by Sabid Mahmud (@sabidmahmud).</description>
    <link>https://dev.to/sabidmahmud</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1080699%2F60b9be7f-cd17-4d89-b84f-aa763ec8f5d6.jpg</url>
      <title>DEV Community: Sabid Mahmud</title>
      <link>https://dev.to/sabidmahmud</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/sabidmahmud"/>
    <language>en</language>
    <item>
      <title>Solving Pickle Rick: An Online CTF Challenge on TryHackMe</title>
      <dc:creator>Sabid Mahmud</dc:creator>
      <pubDate>Sun, 25 Feb 2024 01:00:11 +0000</pubDate>
      <link>https://dev.to/sabidmahmud/solving-pickle-rick-an-online-ctf-challange-on-tryhackme-2hee</link>
      <guid>https://dev.to/sabidmahmud/solving-pickle-rick-an-online-ctf-challange-on-tryhackme-2hee</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;Hacking involves a different way of looking at problems that no one's thought of.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;A CTF, or Capture The Flag, is a cybersecurity competition where participants solve a variety of challenges to find hidden flags, usually in the form of strings or codes. These challenges span different areas of cybersecurity, such as cryptography, web exploitation, reverse engineering, and more. CTFs are important as they provide a hands-on, practical way for individuals to enhance their cybersecurity skills, learn about real-world vulnerabilities, and stay sharp in an ever-evolving field. They simulate the experience of facing and solving security issues, making them a valuable training ground for cybersecurity professionals and enthusiasts alike.&lt;/p&gt;

&lt;p&gt;This particular CTF Pickle Rick is a very easy and beginner level problem. Let's dive into the world of capture the flag whith this Pickle Rick challange on &lt;a href="https://tryhackme.com/" rel="noopener noreferrer"&gt;TryHackMe&lt;/a&gt;. If you're up for the adventure, &lt;a href="https://tryhackme.com/room/picklerick" rel="noopener noreferrer"&gt;click HERE&lt;/a&gt; to be redirected to the challenge.&lt;/p&gt;

&lt;p&gt;As we click on the start machine button, we will get an IP address of the target machine.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjx1iv6e2o6whn46jrkv5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjx1iv6e2o6whn46jrkv5.png" alt="challenge ip"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We see that, the challenge is all about finding vulnerabilities in the website. We need to find 3 flag to help rick. Let's find out.&lt;/p&gt;

&lt;p&gt;At first we need to find the open ports in the target server.&lt;br&gt;
Before that, one thing to keep in mind that, we can not attack this particular machine from outside of it's network. To interact with this machine, either we need to use the online VM provided by tryHackMe or use the openVPN configuration to be accessible to that network.&lt;/p&gt;

&lt;p&gt;Now, let's scan the ports of the machine using nmap.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjf34zqowi4i9e5sv6mer.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjf34zqowi4i9e5sv6mer.png" alt="nmap scan result"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;From the nmap scan, we have found some valuable information about the open ports (port 22 which is used for ssh and port 80 for http) and the OS (linux) of the machine.&lt;/p&gt;

&lt;p&gt;Now, let us see what we find inside the port 80. To do this we can use a tool named dirbuster.&lt;/p&gt;

&lt;p&gt;DirBuster is a tool used for directory and file brute-forcing on web servers. It's designed to discover hidden directories and files by launching a dictionary-based attack against a web server. The primary goal is to identify paths or directories that might not be immediately visible but could potentially contain sensitive or interesting information.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqk9jtj962jcuh8nltpgs.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqk9jtj962jcuh8nltpgs.png" alt="dirb result"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now, we will use another tool, Nikto to scan the webserver.&lt;br&gt;
Nikto is a powerful and versatile tool that helps users identify misconfigurations, outdated software, and potential security risks.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3zlvb08efym2yga8vcye.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3zlvb08efym2yga8vcye.png" alt="nikto result"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Let's see what is in the file &lt;code&gt;login.php&lt;/code&gt; that we found from the nikto scan. Just by browsing &lt;a href="http://10.10.171.210/login.php" rel="noopener noreferrer"&gt;http://10.10.171.210/login.php&lt;/a&gt; we can see the page.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjzx3ghzz8rijlu2jk6vt.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjzx3ghzz8rijlu2jk6vt.png" alt="login.php"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Interesting! We got a login page which might be the admin login interface of this webserver.&lt;/p&gt;

&lt;p&gt;From the dirbuster scan we have found two files: &lt;code&gt;index.html&lt;/code&gt;, and &lt;code&gt;robots.txt&lt;/code&gt; with code 200 which means these files are accessible.&lt;/p&gt;

&lt;p&gt;Let's see what we got in the &lt;code&gt;index.html&lt;/code&gt; file. As I pasted the link &lt;a href="http://10.10.171.210/index.html" rel="noopener noreferrer"&gt;http://10.10.171.210/index.html&lt;/a&gt; in the browser, we got an website.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyuofw490c6lembryqrwk.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyuofw490c6lembryqrwk.png" alt="index.html"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now, we should check the source code of this page to see if there is any clue.&lt;/p&gt;

&lt;p&gt;Hey look, we have found a username in the source-code.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fv47nfvdc9vpwoczifhac.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fv47nfvdc9vpwoczifhac.png" alt="sc-username"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Let us explore other pages.. we found from the dirbuster scan. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2hi2d1nqkfygl2d3lpee.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2hi2d1nqkfygl2d3lpee.png" alt="robot.txt"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I have found some random letters in the &lt;code&gt;robots.txt&lt;/code&gt; file. These might be a password for the user we found in the source code.&lt;/p&gt;

&lt;p&gt;Let us find out...&lt;/p&gt;

&lt;p&gt;I will try the username and the string from robots.txt in the login.php page.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3o7e5l5kbe35fg4yifqa.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3o7e5l5kbe35fg4yifqa.png" alt="Portal"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;A new page appeared.. which is basically the webserver home page. We got a box to input the commands. Let's explore the files and find the hidden flag for Rick.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzm0aiy5brh6xuhcy5hfq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzm0aiy5brh6xuhcy5hfq.png" alt="ss1"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Here I have given the &lt;code&gt;ls&lt;/code&gt; command to see the files. I have found a interesting txt file, &lt;code&gt;Sup3rS3cretPickl3Ingred.txt&lt;/code&gt;.&lt;br&gt;
Now I am going to browse this file and see what is inside. This might be the 1st ingredient for Rick.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwpbg945osuzbcym7lpsv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwpbg945osuzbcym7lpsv.png" alt="1st ingred"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We have found the first ingredient. Let us submit this and check.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fz84pm5h886ue9cirj83h.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fz84pm5h886ue9cirj83h.png" alt="submit 1"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Yes! this was the first ingredient.&lt;/p&gt;

&lt;p&gt;We have to find the second ingredient now.&lt;br&gt;
I looked into the &lt;code&gt;clues.txt&lt;/code&gt; file and found this..&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd2dgl8x3ndwsou4vk70i.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd2dgl8x3ndwsou4vk70i.png" alt="clues.txt"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Lets check the file system for more ingredients.&lt;br&gt;
By using the &lt;code&gt;cd /; ls -al;&lt;/code&gt; command I moved up to the root directory and list all the elements.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fagw7uov187m4myb5kcg7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fagw7uov187m4myb5kcg7.png" alt="/"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Let's check the home directory first. Because it is the directory where all the user data is saved in a linux system.&lt;/p&gt;

&lt;p&gt;By entering the command &lt;code&gt;cd /home; ls -al&lt;/code&gt; I have listed the elements in the /home/ directory. There are two folder for two users; &lt;code&gt;rick&lt;/code&gt; &amp;amp; &lt;code&gt;ubuntu&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqdn4p3z14qdw3t3cq31x.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqdn4p3z14qdw3t3cq31x.png" alt="home"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;As we already have explored the elements of the ubuntu directory, let's change the directory to &lt;code&gt;rick&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjq5q1cbhb7slvlyrseao.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjq5q1cbhb7slvlyrseao.png" alt="rick"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Look what have I found!! There is the second ingredient.&lt;br&gt;
We can see the second ingredient using this command: &lt;code&gt;less /home/rick/'second ingredient'&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnhfp218tp3swc7k8mmgm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnhfp218tp3swc7k8mmgm.png" alt="2nd ingred"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frf1gidrkozxwkxfpef27.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frf1gidrkozxwkxfpef27.png" alt="submit 2"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After submitting the second ingredient, let's find out the third ingredient.&lt;br&gt;
To find the third ingredient, we will check on another interesting directory which is &lt;code&gt;/root&lt;/code&gt;. But this directory can not be accessible without admin or superuser privilege. We are going to check if we can use the &lt;code&gt;sudo&lt;/code&gt; command from this command box. For this I am going to enter this command in the command box: &lt;code&gt;sudo -l&lt;/code&gt;.&lt;br&gt;
Why we did that?&lt;/p&gt;

&lt;p&gt;ok.. The &lt;code&gt;sudo -l&lt;/code&gt; command is used to list the allowed (or forbidden) commands that a user can execute with sudo privileges. When you run &lt;code&gt;sudo -l&lt;/code&gt;, it shows the user's sudo (superuser do) privileges, indicating the commands and options they are permitted to run with elevated privileges.&lt;/p&gt;

&lt;p&gt;Here's what the different outputs might mean:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;User has no sudo privileges:&lt;/strong&gt;&lt;br&gt;
If the output is something like "&lt;code&gt;User [username] is not allowed to run sudo on [hostname].&lt;/code&gt;", it means that the user does not have any sudo privileges.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;User has sudo privileges with restrictions:&lt;/strong&gt;&lt;br&gt;
If the output shows specific commands and options the user can run, it means the user has sudo privileges, but only for the listed commands and options.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;User has unrestricted sudo privileges:&lt;/strong&gt;&lt;br&gt;
If the output shows "&lt;code&gt;User [username] may run the following commands on [hostname]:&lt;/code&gt;", followed by a list of commands, it means the user has sudo privileges for those commands without any restrictions.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For example, if the output is something like this:&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;

User [username] may run the following commands on [hostname]:
    (ALL : ALL) ALL



&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;That means that the user has unrestricted sudo privileges and can run any command as any user on any host.&lt;/p&gt;

&lt;p&gt;In our case, after I have run this command, the output is:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fc3ux5fh704blcd1447st.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fc3ux5fh704blcd1447st.png" alt="sudo -l"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It means that we have the sudo privilege of this application.&lt;br&gt;
Now, let me check what is in the root directory by using the command &lt;code&gt;sudo ls -al /root/&lt;/code&gt;.&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8nqrwqu8bcbwtxiq7wgx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8nqrwqu8bcbwtxiq7wgx.png" alt="root"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Look what it is! We have just found the 3rd ingredient for Rick. We need to view what is writen in the &lt;code&gt;3rd.txt&lt;/code&gt; file by using the command &lt;code&gt;less&lt;/code&gt; and submit it. Let's do it.&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgsflmv6y7nl29dojamxv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgsflmv6y7nl29dojamxv.png" alt="3rd ingred"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After submitting this, it was successfully accepted.&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F72ndahvx11ltwzqzja4f.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F72ndahvx11ltwzqzja4f.png" alt="submit 3"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Voilà! We captured all the flags! Challenge solved.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>vulnerabilities</category>
      <category>hacking</category>
    </item>
  </channel>
</rss>
