Description
Pwn the binary provided to read the flag on the remote service.
Note: This challenge has been made for the training of Team France in September 2019.
Files
- docker-compose.yml
-
alfred
15.48 KiB – 9922408e02d7bfbe7aa1cc81db259107ae33d43fa204fd78abd28f1db78f9143
Author
Challenge Instructions
- First, download docker-compose.yml:
curl https://hackropole.fr/challenges/fcsc2019-pwn-alfred-hitchlock/docker-compose.public.yml -o docker-compose.yml
- Launch the challenge by executing in the same folder:
docker compose up
- Then, in another console, access the challenge with Netcat:
nc localhost 4000
In case you encounter problems, please consult the FAQ.
Flag
Submit your solution
You can submit your writeup for this challenge. Read the FAQ to learn how to proceed.
You need to be logged in to submit a writeup.