This level requires you to find a Set User ID program that will run
as the “flag00” account. You could also find this by carefully looking
in top level directories in / for suspicious looking directories.
Alternatively, look at the find man page.
find / -type f -executable -user -perm -4000 2/dev/null
This finds a file which is executable and under the user permission
which has a suid bit set and we all redirecting the errors to /dev/null
Then execute getflag to win this level.
PS: You wont get any flags while running getflag command 😛