Wave a flag
was an easy puzzle worth 10 points. It presents you with an ELF binary named warm
:
daniel@wildcat ~/Downloads % file warm
warm: ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 3.2.0, BuildID[sha1]=b11c22752c901adc13ba1ce86eda9d5516f22763, with debug_info, not stripped
Description
This puzzle’s description gave a clue on how to solve it:
Can you invoke help flags for a tool or binary? This program has extraordinarily helpful information…
Solving
Many commands have CLI flags which will display a short manual and basic information about the program. These flags are typically -h
or --help
.
I try not to blindly run binaries that I find on the internet, even though I am fairly certain that picoCTF wouldn’t do me dirty with malware.
Knowing that programs can have these help menus and that they are almost always stored as strings, I used the strings
program to extract the flag. I often pipe strings
into less
so I can scroll up and down with the arrow keys/page up/page down, and search the output:
strings warm | less
Sure enough, the flag was in there:

Pingback: picoCTF Writeups – DMFR SECURITY