Description
This test is the first step in the PTSD challenges series: we recommend that you start with this first step.
You have volunteered to carry out a PTSD evaluation: “Protocole Très Sécurisé de transmission de Données”.
This protocol is used by a server to check the status of associated clients.
First, you’ll need to establish a secure communication channel with the server as client #6.
The test flag will be sent once the communication channel has been established.
Note: The libraries libcrypto.so.3
and libssl.so.3
are provided but are not to be analyzed in this test.
This challenge has been split into two parts:
Files
- docker-compose.yml
-
server
30.17 KiB – 64dcafefda9105f35f7ede09d1c92803e21e901545233bf672a2ca9a890bd2ab -
libcrypto.so.3
6.01 MiB – 1672bdbbadb62bd944523ed748bcf8bb830699b55fbb9f58badb7ed093d0a16f -
libssl.so.3
1.12 MiB – 4a4b97aaba454234148b351d0805e22297e6ccfd2187e9371e8242a1594952af -
keys.db
82 B – 7d048af71ef8ce4a15f751379c8ca4e5303e318b9f6a1918b57e7a5335c3fb59 -
lv1.flag
70 B – 33d4db31efbaec30172e731467f659b91cb04e8ccc53d15fa059ff939dfd6c9c -
lv2.flag
70 B – ab68ee7dd2f0361245c3d3bc96398f93c675e6b1d2ba7a6c1e2992b3ccfa77e6
Author
Challenge Instructions
- First, download docker-compose.yml:
curl https://hackropole.fr/challenges/fcsc2024-reverse-ptsd/docker-compose.public.yml -o docker-compose.yml
- Launch the challenge by executing in the same folder:
docker compose up
- Then, in another console, access the challenge with Netcat:
nc localhost 4000
In case you encounter problems, please consult the FAQ.
Flag
Submit your solution
You can submit your writeup for this challenge. Read the FAQ to learn how to proceed.
You need to be logged in to submit a writeup.