Description
I was informed that the first version of my program contained vulnerabilities… However, fixing them would be quite tedious and I don’t really have the time.
But I still developed my own sandbox so that it can no longer be compromised – a much more fun idea! Even LLMs haven’t found any vulnerabilities in its code.
Find a way to escape the sandbox and obtain the flag by executing /getflag.
Note: This challenge is the second part of the Boring challenge.
Files
- docker-compose.yml
-
not-so-boring.tar.xz
859.27 KiB – 96f3c8f74671e454dabc5acdf0a52805f33b24442a4237f6950a57a41203937e
Author
Challenge Instructions
- First, download docker-compose.yml:
curl https://hackropole.fr/challenges/fcsc2026-pwn-not-so-boring/docker-compose.public.yml -o docker-compose.yml - Launch the challenge by executing in the same folder:
docker compose up - Then, in another console, access the challenge with Netcat:
nc localhost 4000
In case you encounter problems, please consult the FAQ.
Flag
Submit your solution
You can submit your writeup for this challenge. Read the FAQ to learn how to proceed.
You need to be logged in to submit a writeup.