Description
Where have my network packets gone?
In this challenge, we invite you to play with XDP.
An attacker has established a discreet communication channel between an infected machine and the network.
Will you be able to retrieve the contents of the packets received on the network interface?
tcpdump
doesn’t seem to be working…
Notes:
- To have a functional
Ctrl-C
, you can usestty -cooked -echo
in your terminal after backgrounding your connection to the challenge made withnc
. - To reproduce the challenge locally:
- Extract the archive with
tar xf babyxdp.tar.xz
. - Start the Docker container with
docker compose up --build
. - Connect to the local challenge with
nc localhost 4000
.
- Extract the archive with
- To connect to the machine, use the password “user”
Files
- docker-compose.yml
-
babyxdp.tar.xz
33.49 MiB – fc1545b7d86264b795d1746cba0cda7dfd95d7f5b0a4c4de81eace07fa2eaa6d
Author

Challenge Instructions
- First, download docker-compose.yml:
curl https://hackropole.fr/challenges/fcsc2025-misc-baby-xdp/docker-compose.public.yml -o docker-compose.yml
- Launch the challenge by executing in the same folder:
docker compose up
- Then, in another console, access the challenge with Netcat:
nc localhost 4000
In case you encounter problems, please consult the FAQ.
Flag
Submit your solution
You can submit your writeup for this challenge. Read the FAQ to learn how to proceed.
You need to be logged in to submit a writeup.