Description
This is the second stage in the PTSD series: we recommend you start with the first. The attached files are the same as for the first stage, with the addition of
records.txt
which is supplied.
While you were marking your client, the customer sends you the traces of the initialization and beyond of client #5 (records.txt
).
Your project manager suggests that you look for a vulnerability in the protocol. You set up a man-in-the-middle attack to impersonate client #5.
Your objective is to impersonate this client by sending their information to the server.
Note that client #5 response time is 10 seconds.
Note: The libraries libcrypto.so.3
and libssl.so.3
are provided but are not to be analyzed in this test.
This challenge has been split into two parts:
Files
- docker-compose.yml
-
server
30.17 KiB β 64dcafefda9105f35f7ede09d1c92803e21e901545233bf672a2ca9a890bd2ab -
libcrypto.so.3
6.01 MiB β 1672bdbbadb62bd944523ed748bcf8bb830699b55fbb9f58badb7ed093d0a16f -
libssl.so.3
1.12 MiB β 4a4b97aaba454234148b351d0805e22297e6ccfd2187e9371e8242a1594952af -
records.txt
1.30 KiB β 71c2facf0915fd26730c9148d37f55c30f83ddd2d4d609977515dbb0a9a4149d -
keys.db
82 B β 7d048af71ef8ce4a15f751379c8ca4e5303e318b9f6a1918b57e7a5335c3fb59 -
lv1.flag
70 B β 33d4db31efbaec30172e731467f659b91cb04e8ccc53d15fa059ff939dfd6c9c -
lv2.flag
70 B β ab68ee7dd2f0361245c3d3bc96398f93c675e6b1d2ba7a6c1e2992b3ccfa77e6
Author
Challenge Instructions
- First, download docker-compose.yml:
curl https://hackropole.fr/challenges/fcsc2024-reverse-ptsd/docker-compose.public.yml -o docker-compose.yml
- Launch the challenge by executing in the same folder:
docker compose up
- Then, in another console, access the challenge with Netcat:
nc localhost 4000
In case you encounter problems, please consult the FAQ.
Flag
Submit your solution
You can submit your writeup for this challenge. Read the FAQ to learn how to proceed.
You need to be logged in to submit a writeup.