Description
You can execute the attached binary performing an AES-128-ECB encryption on a random input, while observing the value of one particular register at a fixed address throughout the whole computation.
Note: The path /app/
in the provided Python file (aes-distrace.py
) needs to be changed to match your environment so that the challenge can run locally.
Files
- docker-compose.yml
-
aes-distrace.c
8.56 KiB β 432409690fa47424495f8122122cbfdd617586174316471a282eb303c2c81811 -
aes-distrace
20.07 KiB β 1f1f5215ad3713d3ad8e4289aaacfbfe5299bf01b55e8ad4e302c2d771bb7ba2 -
aes-distrace.py
1.24 KiB β 3641dc1bd0ff53ea4b07c2863639e46fa29c9907836a6b89856c7ac775941cc4 -
libexeclog.so
48.28 KiB β f4d8d4848deeb3e5ee01a8cce5229ea8eb268af7faaad62725edca648841037e -
qemu-x86_64
13.19 MiB β a82c16266d0c543c0e1e5b2323b4ac683d2c7997e6b36c97aad2973db2f65360
Author
Challenge Instructions
- First, download docker-compose.yml:
curl https://hackropole.fr/challenges/fcsc2025-crypto-aes-distrace/docker-compose.public.yml -o docker-compose.yml
- Launch the challenge by executing in the same folder:
docker compose up
- Then, in another console, access the challenge with Netcat:
nc localhost 4000
In case you encounter problems, please consult the FAQ.
Flag
Submit your solution
You can submit your writeup for this challenge. Read the FAQ to learn how to proceed.
You need to be logged in to submit a writeup.