<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>fcsc2026 on Hackropole</title>
    <link>https://hackropole.fr/en/fcsc2026/</link>
    <description>Recent content in fcsc2026 on Hackropole</description>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Fri, 03 Apr 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://hackropole.fr/en/fcsc2026/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>10 Fast Fishers</title>
      <link>https://hackropole.fr/en/challenges/web/fcsc2026-web-10-fast-fisher/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/web/fcsc2026-web-10-fast-fisher/</guid>
      <description>&lt;p&gt;Think you&amp;rsquo;ve got fast typing skills? Prove it in &lt;strong&gt;10 Fast Fishers&lt;/strong&gt; — the addictive underwater typing game where speed meets style!&lt;/p&gt;&#xA;&lt;p&gt;Watch colorful fish swim across your screen, each carrying a word. Type fast, match the word, click the fish, and watch your document transform before your eyes. Bold pufferfish, italic angelfish, and even some sneaky jellyfish that&amp;rsquo;ll mess with your formatting!&lt;/p&gt;&#xA;&lt;p&gt;Build combos, rack up points, and become the ocean&amp;rsquo;s greatest typist. But beware of the squid&amp;hellip; 🦑&lt;/p&gt;</description>
    </item>
    <item>
      <title>A la recherche du Wapiti</title>
      <link>https://hackropole.fr/en/challenges/hardware/fcsc2026-hardware-a-la-recherche-du-wapiti/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/hardware/fcsc2026-hardware-a-la-recherche-du-wapiti/</guid>
      <description>&lt;p&gt;While traveling in northern China, you find sensors in your accommodation.&#xA;These are based on ESP32C3, but they seem to speak a language you do not understand.&lt;/p&gt;&#xA;&lt;p&gt;Armed with your Wi-Fi card and your tools, you manage to retrieve the firmware from one of the ESP32 devices.&lt;/p&gt;</description>
    </item>
    <item>
      <title>À une vache près</title>
      <link>https://hackropole.fr/en/challenges/crypto/fcsc2026-crypto-a-une-vache-pres/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/crypto/fcsc2026-crypto-a-une-vache-pres/</guid>
      <description>&lt;p&gt;&#xA;&lt;img class=&#34;img-fluid&#34; src=&#34;https://hackropole.fr/challenges/fcsc2026-crypto-a-une-vache-pres/public/a-une-vache-pres.jpg&#34; alt=&#34;&#34;&gt;&#xA;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Adresses du noyau - Pour commencer</title>
      <link>https://hackropole.fr/en/challenges/forensics/fcsc2026-forensics-kaslr-1/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/forensics/fcsc2026-forensics-kaslr-1/</guid>
      <description>&lt;p&gt;You receive RAM captures on three machines, and you are looking for the address of the first kernel instruction (using the _stext function) for each of them.&lt;/p&gt;&#xA;&lt;p&gt;The flag is in the format &lt;code&gt;FCSC{phys-virt}&lt;/code&gt; where:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;phys&lt;/code&gt; is the physical address of the first kernel instruction,&lt;/li&gt;&#xA;&lt;li&gt;&lt;code&gt;virt&lt;/code&gt; is the virtual address of the first kernel instruction in the kernel text mapping.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;All addresses are 64 bits, in hexadecimal format with a 0x prefix.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Adresses du noyau - Sans symboles</title>
      <link>https://hackropole.fr/en/challenges/forensics/fcsc2026-forensics-kaslr-3/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/forensics/fcsc2026-forensics-kaslr-3/</guid>
      <description>&lt;p&gt;You receive RAM captures on three machines, and you are looking for the address of the first kernel instruction (using the _stext function) for each of them.&lt;/p&gt;&#xA;&lt;p&gt;The flag is in the format &lt;code&gt;FCSC{phys-virt-direct}&lt;/code&gt; where:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;phys&lt;/code&gt; is the physical address of the first kernel instruction,&lt;/li&gt;&#xA;&lt;li&gt;&lt;code&gt;virt&lt;/code&gt; is the virtual address of the first kernel instruction in the kernel text mapping area,&lt;/li&gt;&#xA;&lt;li&gt;&lt;code&gt;direct&lt;/code&gt; is the virtual address of the first kernel instruction in the direct mapping area.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;All addresses are 64 bits, in hexadecimal format with a 0x prefix.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Adresses du noyau - Un peu d&#39;aléa</title>
      <link>https://hackropole.fr/en/challenges/forensics/fcsc2026-forensics-kaslr-2/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/forensics/fcsc2026-forensics-kaslr-2/</guid>
      <description>&lt;p&gt;You receive RAM captures on three machines, and you are looking for the address of the first kernel instruction (using the _stext function) for each of them.&lt;/p&gt;&#xA;&lt;p&gt;The flag is in the format &lt;code&gt;FCSC{phys-virt}&lt;/code&gt; where:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;phys&lt;/code&gt; is the physical address of the first kernel instruction,&lt;/li&gt;&#xA;&lt;li&gt;&lt;code&gt;virt&lt;/code&gt; is the virtual address of the first kernel instruction in the kernel text mapping.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;All addresses are 64 bits, in hexadecimal format with a 0x prefix.&lt;/p&gt;</description>
    </item>
    <item>
      <title>ASCII Badge</title>
      <link>https://hackropole.fr/en/challenges/hardware/fcsc2026-hardware-ascii-badge/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/hardware/fcsc2026-hardware-ascii-badge/</guid>
      <description>&lt;p&gt;A friend configured &lt;a href=&#34;https://github.com/FCSC-FR/hackropole-badge/tree/61d627868d038e7277b8fd4fc4294c639a5fc889&#34;&gt;their Hackropole badge&lt;/a&gt; to encode a flag on the 8 LEDs. While they are away, you dump the firmware of their badge.&lt;/p&gt;&#xA;&lt;p&gt;&lt;em&gt;Can you recover the flag from the dump ?&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Note&lt;/strong&gt;: having the physical badge is not necessary to solve this challenge, the original firmware has not been modified.&lt;/p&gt;&#xA;&lt;p&gt;&#xA;&lt;img class=&#34;img-fluid&#34; src=&#34;https://hackropole.fr/challenges/fcsc2026-hardware-ascii-badge/public/ascii-badge.gif&#34; alt=&#34;Partial badge animation&#34;&gt;&#xA;&lt;/p&gt;</description>
    </item>
    <item>
      <title>autodiag</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-autodiag/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-autodiag/</guid>
      <description>&lt;p&gt;This debug port looks promising.&lt;/p&gt;</description>
    </item>
    <item>
      <title>BadAES</title>
      <link>https://hackropole.fr/en/challenges/crypto/fcsc2026-crypto-badaes/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/crypto/fcsc2026-crypto-badaes/</guid>
      <description>&lt;p&gt;&#xA;&lt;img class=&#34;img-fluid&#34; src=&#34;https://hackropole.fr/challenges/fcsc2026-crypto-badaes/./public/badaes.png&#34; alt=&#34;&#34;&gt;&#xA;&lt;/p&gt;</description>
    </item>
    <item>
      <title>boring</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-boring/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-boring/</guid>
      <description>&lt;p&gt;JSON format is pretty boring, don’t you think?&#xA;A binary representation is immediately more fun!&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; This challenge is the first part of the &lt;code&gt;Not So Boring&lt;/code&gt; challenge.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Brontosaure</title>
      <link>https://hackropole.fr/en/challenges/reverse/fcsc2026-reverse-brontosaure/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/reverse/fcsc2026-reverse-brontosaure/</guid>
      <description>&lt;p&gt;You need to write a keygen for this binary, and then validate it on the remote service.&lt;/p&gt;&#xA;&lt;p&gt;&#xA;&lt;img class=&#34;img-fluid&#34; src=&#34;https://hackropole.fr/challenges/fcsc2026-reverse-brontosaure/public/brontosaure.png&#34; alt=&#34;&#34;&gt;&#xA;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Bubulle Corp (Part 1)</title>
      <link>https://hackropole.fr/en/challenges/web/fcsc2026-web-bubulle-corp-1/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/web/fcsc2026-web-bubulle-corp-1/</guid>
      <description>&lt;p&gt;Bubulle Corp is hiring! Join our team of marine experts and help us monitor deep sea operations from our brand new corporate dashboard.&lt;/p&gt;&#xA;&lt;p&gt;As a new recruit, you&amp;rsquo;ll have access to fleet tracking, catch reports, and depth analytics. But rumor has it the captain keeps his secret Paella recipe hidden somewhere on the platform&amp;hellip;&lt;/p&gt;&#xA;&lt;p&gt;Can you find it?&lt;/p&gt;</description>
    </item>
    <item>
      <title>Bubulle Corp (Part 2)</title>
      <link>https://hackropole.fr/en/challenges/web/fcsc2026-web-bubulle-corp-2/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/web/fcsc2026-web-bubulle-corp-2/</guid>
      <description>&lt;p&gt;Bubulle Corp is hiring! Join our team of marine experts and help us monitor deep sea operations from our brand new corporate dashboard.&lt;/p&gt;&#xA;&lt;p&gt;As a new recruit, you&amp;rsquo;ll have access to fleet tracking, catch reports, and depth analytics. But rumor has it the captain keeps his secret Paella recipe hidden somewhere on the platform&amp;hellip;&lt;/p&gt;&#xA;&lt;p&gt;Can you find it?&lt;/p&gt;</description>
    </item>
    <item>
      <title>Ceci n&#39;est pas une Bellcore 1/2</title>
      <link>https://hackropole.fr/en/challenges/hardware/fcsc2026-hardware-ceci-n-est-pas-une-bellcore-1/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/hardware/fcsc2026-hardware-ceci-n-est-pas-une-bellcore-1/</guid>
      <description>&lt;p&gt;Imagine it&amp;rsquo;s the fall of 1996, and a team at Bellcore has just announced&#xA;an attack that can break RSA keys.&#xA;To break an RSA key &lt;code&gt;(n, e, d)&lt;/code&gt;, they require a pair&#xA;&lt;code&gt;(s, s&#39;)&lt;/code&gt;,&#xA;where &lt;code&gt;s = m^d mod n&lt;/code&gt; is the correct signature of a message&#xA;&lt;code&gt;m&lt;/code&gt;, and &lt;code&gt;s&#39;&lt;/code&gt; is a faulty signature of the same message,&#xA;resulting from a perturbed computation.&lt;/p&gt;&#xA;&lt;p&gt;Following this announcement, Lenstra devised a similar attack&#xA;that only requires knowledge of &lt;code&gt;(m, s&#39;)&lt;/code&gt;, without access to the&#xA;correct signature.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Ceci n&#39;est pas une Bellcore 2/2</title>
      <link>https://hackropole.fr/en/challenges/hardware/fcsc2026-hardware-ceci-n-est-pas-une-bellcore-2/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/hardware/fcsc2026-hardware-ceci-n-est-pas-une-bellcore-2/</guid>
      <description>&lt;p&gt;The difficulty is further increased by using code that protects&#xA;the private exponent with Euclidean division (random distribution of the exponent).&lt;/p&gt;&#xA;&lt;p&gt;This challenge is extremely difficult; it is recommended to start with challenge 1/2.&#xA;Furthermore, the challenge can initially be solved locally before validating the solution using the server.&lt;/p&gt;&#xA;&lt;p&gt;The documentation of the virtual machine is available &lt;a href=&#34;https://hackropole.fr/en/doc/vm2026/&#34;&gt;on this page&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Code Breaker</title>
      <link>https://hackropole.fr/en/challenges/crypto/fcsc2026-crypto-code-breaker/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/crypto/fcsc2026-crypto-code-breaker/</guid>
      <description>&lt;p&gt;&#xA;&lt;img class=&#34;img-fluid&#34; src=&#34;https://hackropole.fr/challenges/fcsc2026-crypto-code-breaker/public/code-breaker.jpg&#34; alt=&#34;&#34;&gt;&#xA;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Computing Software</title>
      <link>https://hackropole.fr/en/challenges/reverse/fcsc2026-reverse-computing-software-2/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/reverse/fcsc2026-reverse-computing-software-2/</guid>
      <description>&lt;p&gt;Your friend just found a very interesting piece of software on a portable computer. This software looks like working on his computer, but not on yours. Confused, your friend provided you an execution trace to investigate.&lt;/p&gt;&#xA;&lt;p&gt;Find a way to execute this software!&lt;/p&gt;</description>
    </item>
    <item>
      <title>Convolu-quoi ?</title>
      <link>https://hackropole.fr/en/challenges/hardware/fcsc2026-hardware-convolu-quoi/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/hardware/fcsc2026-hardware-convolu-quoi/</guid>
      <description>&lt;p&gt;Convolutional codes are frequently used in wireless communication standards: in mobile networks, in Wi-Fi, but also in space transmissions.&#xA;With a convolutional code, a message &lt;code&gt;m(x)&lt;/code&gt; is multiplied bit by bit by two defined polynomials &lt;code&gt;p1(x)&lt;/code&gt; and &lt;code&gt;p2(x)&lt;/code&gt;.&lt;/p&gt;&#xA;&lt;p&gt;For example, in GSM (also called second generation mobile network, 2G), two outputs are calculated: &lt;code&gt;c1(x) = m(x) * p1(x)&lt;/code&gt; and &lt;code&gt;c2(x) = m(x) * p2(x)&lt;/code&gt;.&#xA;The transmitted message alternately contains the bits of &lt;code&gt;c1(x)&lt;/code&gt; and &lt;code&gt;c2(x)&lt;/code&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Deep Blue</title>
      <link>https://hackropole.fr/en/challenges/web/fcsc2026-web-deep-blue/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/web/fcsc2026-web-deep-blue/</guid>
      <description>&lt;p&gt;Discover this new marine blog! Will you manage to steal the secret recipe for the best fish &amp;amp; chips in the author?&lt;/p&gt;</description>
    </item>
    <item>
      <title>Délog</title>
      <link>https://hackropole.fr/en/challenges/crypto/fcsc2026-crypto-delog/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/crypto/fcsc2026-crypto-delog/</guid>
      <description>&lt;p&gt;The discrete logarithm problem is at the heart of several cryptographic primitives used today.&#xA;I encrypted my flag with an elliptic curve, can you recover it ?&lt;/p&gt;</description>
    </item>
    <item>
      <title>dixvision</title>
      <link>https://hackropole.fr/en/challenges/crypto/fcsc2026-crypto-dixvision/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/crypto/fcsc2026-crypto-dixvision/</guid>
      <description>&lt;p&gt;&#xA;&lt;img class=&#34;img-fluid&#34; src=&#34;https://hackropole.fr/challenges/fcsc2026-crypto-dixvision/public/dixvision.png&#34; alt=&#34;&#34;&gt;&#xA;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Extensif</title>
      <link>https://hackropole.fr/en/challenges/reverse/fcsc2026-reverse-extensif/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/reverse/fcsc2026-reverse-extensif/</guid>
      <description>&lt;p&gt;What is wrong with my registers ? I do not understand anymore.&lt;/p&gt;</description>
    </item>
    <item>
      <title>FCSC Aquarium</title>
      <link>https://hackropole.fr/en/challenges/web/fcsc2026-web-fcsc-aquarium/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/web/fcsc2026-web-fcsc-aquarium/</guid>
      <description>&lt;p&gt;The FCSC has opened an Aquarium, &lt;a href=&#34;https://fcsc-aquarium.fcsc.fr&#34;&gt;visit it&lt;/a&gt;!&lt;/p&gt;</description>
    </item>
    <item>
      <title>FizzBuzz (1/2)</title>
      <link>https://hackropole.fr/en/challenges/misc/fcsc2026-misc-fizzbuzz-1/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/misc/fcsc2026-misc-fizzbuzz-1/</guid>
      <description>&lt;p&gt;Using the virtual machine, you must produce a string that performs a FizzBuzz count.&lt;/p&gt;&#xA;&lt;p&gt;The documentation of the virtual machine is available &lt;a href=&#34;https://hackropole.fr/en/doc/vm2026/&#34;&gt;on this page&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>FizzBuzz (2/2)</title>
      <link>https://hackropole.fr/en/challenges/misc/fcsc2026-misc-fizzbuzz-2/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/misc/fcsc2026-misc-fizzbuzz-2/</guid>
      <description>&lt;p&gt;Using the virtual machine, you must produce a string that performs a FizzBuzz count.&lt;/p&gt;&#xA;&lt;p&gt;Be careful, some instructions are not allowed.&lt;/p&gt;&#xA;&lt;p&gt;The documentation of the virtual machine is available &lt;a href=&#34;https://hackropole.fr/en/doc/vm2026/&#34;&gt;on this page&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Forenzeek - Compromission initiale</title>
      <link>https://hackropole.fr/en/challenges/forensics/fcsc2026-forensics-forenzeek-1/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/forensics/fcsc2026-forensics-forenzeek-1/</guid>
      <description>&lt;p&gt;Network logs from &lt;a href=&#34;https://docs.zeek.org/en/master/scripts/base/protocols/conn/main.zeek.html#type-Conn::Info&#34;&gt;the Zeek tool&lt;/a&gt; were collected on a network where an attacker was detected. Only a portion of the Zeek log fields are available.&lt;/p&gt;&#xA;&lt;p&gt;A compromise was observed on the machine with the IP address 192.168.1.42. This compromise was achieved via a malicious email containing a fairly large payload. Can you find the UID of the connection associated with downloading the email? (e.g., 1ac41a8ff0fd305679)&lt;/p&gt;&#xA;&lt;p&gt;The flag is in the format &lt;code&gt;FCSC{uid}&lt;/code&gt; (e.g., &lt;code&gt;FCSC{1ac41a8ff0fd305679}&lt;/code&gt;).&lt;/p&gt;</description>
    </item>
    <item>
      <title>Forenzeek - Latéralisation</title>
      <link>https://hackropole.fr/en/challenges/forensics/fcsc2026-forensics-forenzeek-2/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/forensics/fcsc2026-forensics-forenzeek-2/</guid>
      <description>&lt;p&gt;Following the initial compromise you analyzed, the attacker apparently didn&amp;rsquo;t stop there! It seems the network administrator detected unusual activity on their network administration machine. Can you identify the UID of the connection that allowed the attacker to compromise the administrator&amp;rsquo;s machine? (e.g., 1ac41a8ff0fd305679)&lt;/p&gt;&#xA;&lt;p&gt;The flag is in the format &lt;code&gt;FCSC{uid}&lt;/code&gt; (e.g., &lt;code&gt;FCSC{1ac41a8ff0fd305679}&lt;/code&gt;).&lt;/p&gt;</description>
    </item>
    <item>
      <title>Frankenshtein</title>
      <link>https://hackropole.fr/en/challenges/reverse/fcsc2026-reverse-frankenshtein/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/reverse/fcsc2026-reverse-frankenshtein/</guid>
      <description>&lt;p&gt;What is this creature ?&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Note&lt;/strong&gt;: This challenge requires a sufficiently recent version of Python, e.g., Python 3.13. If you need to execute the given script, you can use this Docker command: &lt;code&gt;docker container run -v ./frankenshtein.py:/fcsc/frankenshtein.py -it python:3.13.11-alpine3.23 /fcsc/frankenshtein.py&lt;/code&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Fully Homomorphic RSA</title>
      <link>https://hackropole.fr/en/challenges/crypto/fcsc2026-crypto-fully-homomorphic-rsa/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/crypto/fcsc2026-crypto-fully-homomorphic-rsa/</guid>
      <description>&lt;p&gt;It is well known that the plain RSA primitive is multiplicatively homomorphic: the ciphertext corresponding to the product of two plaintexts is the product of the two ciphertexts.&#xA;After several years of work, our researchers have obtained a major breakthrough: they have figured out how to compute the ciphertext corresponding to the sum of two plaintexts using only the original ciphertexts and the public key.&#xA;This makes the RSA cryptosystem fully homomorphic!&lt;/p&gt;</description>
    </item>
    <item>
      <title>GoodAES</title>
      <link>https://hackropole.fr/en/challenges/crypto/fcsc2026-crypto-aes/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/crypto/fcsc2026-crypto-aes/</guid>
      <description>&lt;p&gt;AES (Advanced Encryption Standard) is used in tens of billions of products. This symmetric encryption algorithm has found its way in computers, phones, cars, watches&amp;hellip; It is used to protect data of all kind.&lt;/p&gt;&#xA;&lt;p&gt;It is therefore critical to know how to use it, to encrypt and decrypt data. Here is a &lt;em&gt;flag&lt;/em&gt; encrypted with AES-128 in CBC mode, decrypt it.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Grhelp - Connect back</title>
      <link>https://hackropole.fr/en/challenges/forensics/fcsc2026-forensics-grhelp-1/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/forensics/fcsc2026-forensics-grhelp-1/</guid>
      <description>&lt;p&gt;You have the &lt;code&gt;auditd&lt;/code&gt; logs of a compromised infrastructure.&lt;/p&gt;&#xA;&lt;p&gt;The attacker successfully executed a command on a server, allowing it to connect to their command and control server.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;What command did the attacker execute? (e.g., `bash echo &amp;ldquo;FCSC&amp;rdquo;)&lt;/li&gt;&#xA;&lt;li&gt;What is the name of the compromised machine that executed this command? (e.g., &lt;code&gt;Workstation&lt;/code&gt;)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;The flag is the concatenation of the two responses: &lt;code&gt;FCSC{machine-commandline}&lt;/code&gt; (e.g., &lt;code&gt;FCSC{Workstation-bash echo &amp;quot;FCSC&amp;quot;}&lt;/code&gt;)&lt;/p&gt;</description>
    </item>
    <item>
      <title>Grhelp - Exfiltration</title>
      <link>https://hackropole.fr/en/challenges/forensics/fcsc2026-forensics-grhelp-2/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/forensics/fcsc2026-forensics-grhelp-2/</guid>
      <description>&lt;p&gt;The attacker appears to have successfully exfiltrated the backupfiler machine. Can you identify:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;the tool used to exfiltrate the data&lt;/li&gt;&#xA;&lt;li&gt;the absolute path of the exfiltrated file&lt;/li&gt;&#xA;&lt;li&gt;the time the data was prepared for exfiltration (YYYY-MM-DDTHH:MM:SS in UTC)?&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;The flag is the concatenation of the three responses: &lt;code&gt;FCSC{tool-filepath-YYYY-MM-DDTHH:MM:SS}&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Hashing goes brrr</title>
      <link>https://hackropole.fr/en/challenges/crypto/fcsc2026-crypto-hashing-goes-brrr/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/crypto/fcsc2026-crypto-hashing-goes-brrr/</guid>
      <description>&lt;p&gt;&#xA;&lt;img class=&#34;img-fluid&#34; src=&#34;https://hackropole.fr/challenges/fcsc2026-crypto-hashing-goes-brrr/./public/hashing-goes-brrr.png&#34; alt=&#34;&#34;&gt;&#xA;&lt;/p&gt;</description>
    </item>
    <item>
      <title>History</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-history/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-history/</guid>
      <description>&lt;p&gt;Here is an implementation of logging (history) of entered commands.&#xA;Do not worry, the commands are not interpreted.&#xA;Read the file &lt;code&gt;flag.txt&lt;/code&gt; located on the server.&lt;/p&gt;</description>
    </item>
    <item>
      <title>I love permutations</title>
      <link>https://hackropole.fr/en/challenges/crypto/fcsc2026-crypto-i-love-permutations/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/crypto/fcsc2026-crypto-i-love-permutations/</guid>
      <description>&lt;p&gt;I like permutations. So I decided to create my own block cipher.&lt;/p&gt;&#xA;&lt;p&gt;&#xA;&lt;img class=&#34;img-fluid&#34; src=&#34;https://hackropole.fr/challenges/fcsc2026-crypto-i-love-permutations/./public/i-love-permutations.png&#34; alt=&#34;&#34;&gt;&#xA;&lt;/p&gt;</description>
    </item>
    <item>
      <title>I&#39;ve lost my comment</title>
      <link>https://hackropole.fr/en/challenges/misc/fcsc2026-misc-i-ve-lost-my-comment/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/misc/fcsc2026-misc-i-ve-lost-my-comment/</guid>
      <description>&lt;p&gt;&#xA;&lt;img class=&#34;img-fluid&#34; src=&#34;https://hackropole.fr/challenges/fcsc2026-misc-i-ve-lost-my-comment/public/i-ve-lost-my-comment.jpeg&#34; alt=&#34;&#34;&gt;&#xA;&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Note&lt;/strong&gt;: this challenge was a part of the FCSC 2026 prechall.&lt;/p&gt;</description>
    </item>
    <item>
      <title>inferno</title>
      <link>https://hackropole.fr/en/challenges/reverse/fcsc2026-reverse-inferno/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/reverse/fcsc2026-reverse-inferno/</guid>
      <description>&lt;p&gt;They say that hell is paved with good intentions, but this one is made of impossible angles and paths with no return. Even Beastie ended up throwing his trident into the furnace.&lt;/p&gt;&#xA;&lt;p&gt;Tested on FreeBSD 15.0 (amd64).&lt;/p&gt;</description>
    </item>
    <item>
      <title>L&#39;étape perdue</title>
      <link>https://hackropole.fr/en/challenges/reverse/fcsc2026-reverse-etape-perdue/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/reverse/fcsc2026-reverse-etape-perdue/</guid>
      <description>&lt;p&gt;The program provided performs operations on an IQ signal, allowing you to isolate information that I&amp;rsquo;m sure will interest you.&lt;/p&gt;&#xA;&lt;p&gt;Unfortunately, its configuration file has been lost! Will you be able to reconstruct it after recovering the missing step? If so, you&amp;rsquo;ll need to listen very carefully!&#xA;The IQ recording provided has been sampled at 250 kHz.&lt;/p&gt;</description>
    </item>
    <item>
      <title>La routine</title>
      <link>https://hackropole.fr/en/challenges/reverse/fcsc2026-reverse-la-routine/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/reverse/fcsc2026-reverse-la-routine/</guid>
      <description>&lt;p&gt;♫ This is myyyyyyyyy way ♫&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Note&lt;/strong&gt;: This is an untranslatable French musical reference, because &amp;ldquo;My Way&amp;rdquo; from Frank Sinatra is an adaptation of &amp;ldquo;Comme d&amp;rsquo;habitude&amp;rdquo; from Claude François.&#xA;&amp;ldquo;Comme d&amp;rsquo;habitude&amp;rdquo; is translated with &amp;ldquo;as usual&amp;rdquo;, which is roughly the challenge name. If you read until this point, you can go listen to each song :)&lt;/p&gt;</description>
    </item>
    <item>
      <title>Las Vegas Baby</title>
      <link>https://hackropole.fr/en/challenges/misc/fcsc2026-misc-las-vegas-baby/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/misc/fcsc2026-misc-las-vegas-baby/</guid>
      <description>&lt;p&gt;You are in Las Vegas, in the middle of a Texas Hold&amp;rsquo;em poker tournament.&#xA;All the players have gone on a break, and you find yourself alone with the deck of cards and your conscience.&#xA;The temptation to cheat arises.&lt;/p&gt;&#xA;&lt;p&gt;However, the task is not so simple: the dealer cuts the deck at a random position before dealing the cards.&#xA;You must therefore be clever so that the deal gives you the best hand, regardless of where the dealer cuts.&#xA;Additionally, you know you will be in the small blind, but you do not yet know whether there will be 3 or 4 players after the break.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Little d - Big trouble</title>
      <link>https://hackropole.fr/en/challenges/crypto/fcsc2026-crypto-little-d-big-trouble-1/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/crypto/fcsc2026-crypto-little-d-big-trouble-1/</guid>
      <description>&lt;p&gt;The FIPS 186-5 standard requires, in the generation of an RSA key, that the private&#xA;exponent &lt;code&gt;d&lt;/code&gt; be greater than &lt;code&gt;2**(size//2)&lt;/code&gt;. The standard also specifies&#xA;that in the extremely rare case where &lt;code&gt;d&lt;/code&gt; is smaller, new prime numbers &lt;code&gt;p&lt;/code&gt; and &lt;code&gt;q&lt;/code&gt;&#xA;must be generated.&lt;/p&gt;&#xA;&lt;p&gt;Try your luck by submitting one of these extremely rare cases.&lt;/p&gt;&#xA;&lt;p&gt;&#xA;&lt;img class=&#34;img-fluid&#34; src=&#34;https://hackropole.fr/challenges/fcsc2026-crypto-little-d-big-trouble/./public/little-d-big-trouble.jpg&#34; alt=&#34;&#34;&gt;&#xA;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Little d - Big trouble (Revenge)</title>
      <link>https://hackropole.fr/en/challenges/crypto/fcsc2026-crypto-little-d-big-trouble-2/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/crypto/fcsc2026-crypto-little-d-big-trouble-2/</guid>
      <description>&lt;p&gt;The FIPS 186-5 standard requires, in the generation of an RSA key, that the private&#xA;exponent &lt;code&gt;d&lt;/code&gt; be greater than &lt;code&gt;2**(size//2)&lt;/code&gt;. The standard also specifies&#xA;that in the extremely rare case where &lt;code&gt;d&lt;/code&gt; is smaller, new prime numbers &lt;code&gt;p&lt;/code&gt; and &lt;code&gt;q&lt;/code&gt;&#xA;must be generated.&lt;/p&gt;&#xA;&lt;p&gt;Try your luck by submitting one of these extremely rare cases.&lt;/p&gt;&#xA;&lt;p&gt;&#xA;&lt;img class=&#34;img-fluid&#34; src=&#34;https://hackropole.fr/challenges/fcsc2026-crypto-little-d-big-trouble/public/little-d-big-trouble.jpg&#34; alt=&#34;&#34;&gt;&#xA;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Look up: From the skies</title>
      <link>https://hackropole.fr/en/challenges/hardware/fcsc2026-hardware-lookup/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/hardware/fcsc2026-hardware-lookup/</guid>
      <description>&lt;p&gt;Satellite communications ain&amp;rsquo;t mystical.&#xA;Before DVB-S2, another standard was used.&#xA;To start, here is a baseband signal, sampled at 1 sample per symbol.&lt;/p&gt;&#xA;&lt;p&gt;Can you recover the transported video ?&lt;/p&gt;&#xA;&lt;p&gt;The capture contains IQ samples, with each component being a float32.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Look up: Past Future</title>
      <link>https://hackropole.fr/en/challenges/hardware/fcsc2026-hardware-lookup-2/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/hardware/fcsc2026-hardware-lookup-2/</guid>
      <description>&lt;p&gt;There is a standard between DVB-S and DVB-S2 known as DVB-DSNG. This is a new baseband signal, at one sample per symbol.&lt;/p&gt;&#xA;&lt;p&gt;Will you be able to recover the video data?&lt;/p&gt;&#xA;&lt;p&gt;The capture is in IQ format, with each component being a float32.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Macroplata</title>
      <link>https://hackropole.fr/en/challenges/crypto/fcsc2026-crypto-macroplata/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/crypto/fcsc2026-crypto-macroplata/</guid>
      <description>&lt;p&gt;I did not know what crypto to use, so I used it all.&lt;/p&gt;&#xA;&lt;p&gt;&#xA;&lt;img class=&#34;img-fluid&#34; src=&#34;https://hackropole.fr/challenges/fcsc2026-crypto-macroplata/./public/macroplata.png&#34; alt=&#34;&#34;&gt;&#xA;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Maintenant, l&#39;ESP !</title>
      <link>https://hackropole.fr/en/challenges/hardware/fcsc2026-hardware-maintenant-lesp/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/hardware/fcsc2026-hardware-maintenant-lesp/</guid>
      <description>&lt;p&gt;Wi-Fi communication is not limited to devices connected to the same access point.&#xA;Direct communication between devices is possible using certain protocols.&#xA;ESP-NOW is one such example.&lt;/p&gt;&#xA;&lt;p&gt;What were my two ESP32 talking about?&lt;/p&gt;</description>
    </item>
    <item>
      <title>Minimaliste</title>
      <link>https://hackropole.fr/en/challenges/web/fcsc2026-web-minimaliste/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/web/fcsc2026-web-minimaliste/</guid>
      <description>&lt;p&gt;A flag seems to have been hidden during the development of this very minimalist website.&#xA;Can you find it?&lt;/p&gt;</description>
    </item>
    <item>
      <title>netsec</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-netsec/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-netsec/</guid>
      <description>&lt;p&gt;You are tasked with carrying out a red team exercise on a major company. After many days spent infiltrating your target&amp;rsquo;s network, you are very close to achieving your objective. You only need to access the company&amp;rsquo;s central server to succeed, but unfortunately it appears to be invulnerable.&lt;/p&gt;&#xA;&lt;p&gt;Your only lead to compromise this machine is a mysterious service listening on port 1337. Fortunately, during your intrusion you previously discovered the file &lt;code&gt;netsec.tar.xz&lt;/code&gt;, which seems to be a backup from this server.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Not So Boring</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-not-so-boring/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-not-so-boring/</guid>
      <description>&lt;p&gt;I was informed that the first version of my program contained vulnerabilities…&#xA;However, fixing them would be quite tedious and I don&amp;rsquo;t really have the time.&lt;/p&gt;&#xA;&lt;p&gt;But I still developed my own sandbox so that it can no longer be compromised &amp;ndash; a much more fun idea!&#xA;Even LLMs haven&amp;rsquo;t found any vulnerabilities in its code.&lt;/p&gt;&#xA;&lt;p&gt;Find a way to escape the sandbox and obtain the flag by executing &lt;code&gt;/getflag&lt;/code&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>OscillArt</title>
      <link>https://hackropole.fr/en/challenges/misc/fcsc2026-misc-oscillart/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/misc/fcsc2026-misc-oscillart/</guid>
      <description>&lt;p&gt;My physics teacher sent me this video, but it seems to be corrupted.&#xA;Can you help me identify the &lt;em&gt;flag&lt;/em&gt; shown?&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Warning: the video is very loud!&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Note&lt;/strong&gt;: this challenge was a part of the FCSC 2026 prechall.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Provably Secure Signature</title>
      <link>https://hackropole.fr/en/challenges/hardware/fcsc2026-hardware-provably-secure-signature/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/hardware/fcsc2026-hardware-provably-secure-signature/</guid>
      <description>&lt;p&gt;It&amp;rsquo;s a shock for Mr. CRT1: he has just learned that, with the right protocol,&#xA;the RSA signature scheme is not vulnerable to the famous Bellcore attack.&lt;/p&gt;&#xA;&lt;p&gt;Confident, he decides to implement RSA without verifying the signature.&lt;/p&gt;&#xA;&lt;p&gt;The documentation of the virtual machine is available &lt;a href=&#34;https://hackropole.fr/en/doc/vm2026/&#34;&gt;on this page&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Puissance 4</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-puissance4/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-puissance4/</guid>
      <description>&lt;p&gt;If you succeeded with the &amp;ldquo;baby version, now try this one, which is just a tiny bit more complex.&#xA;Your goal is still to read the &lt;code&gt;flag.txt&lt;/code&gt; file located on the server.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Puissance 4 (baby)</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-puissance4-baby/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-puissance4-baby/</guid>
      <description>&lt;p&gt;Will you be able to win at Connect Four against a dumb AI?&#xA;And if so, you can then try to read the &lt;code&gt;flag.txt&lt;/code&gt; file located on the server.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Ready to Go?</title>
      <link>https://hackropole.fr/en/challenges/misc/fcsc2026-misc-rpc-me/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/misc/fcsc2026-misc-rpc-me/</guid>
      <description>&lt;p&gt;We found a network connection that contains an unknown proprietary protocol.&#xA;Can you understand the application that implements it?&lt;/p&gt;</description>
    </item>
    <item>
      <title>RemoBLE Control</title>
      <link>https://hackropole.fr/en/challenges/hardware/fcsc2026-hardware-remoble-control/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/hardware/fcsc2026-hardware-remoble-control/</guid>
      <description>&lt;p&gt;Armed with your trusty nRF52840 and the &lt;a href=&#34;https://whad.io/&#34;&gt;WHAD&lt;/a&gt; project, you captured Bluetooth Low Energy communications between a wireless keyboard and a computer.&#xA;What did they say to each other?&lt;/p&gt;&#xA;&lt;p&gt;The command line used for each capture is as follows: &lt;code&gt;wsniff --interface uart0 --format=raw --no-metadata ble -f&lt;/code&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; The keyboard used is configured in AZERTY.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Rocket Launcher</title>
      <link>https://hackropole.fr/en/challenges/reverse/fcsc2026-reverse-rocket-launcher/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/reverse/fcsc2026-reverse-rocket-launcher/</guid>
      <description>&lt;p&gt;A missile launch system is operated via an industrial control panel. This panel is controlled by a Siemens S7-300 programmable logic controller (PLC).&lt;/p&gt;&#xA;&lt;p&gt;&#xA;&lt;img class=&#34;img-fluid&#34; src=&#34;https://hackropole.fr/challenges/fcsc2026-reverse-rocket-launcher/./public/rocket-launcher-pupitre.png&#34; alt=&#34;&#34;&gt;&#xA;&lt;/p&gt;&#xA;&lt;p&gt;The control panel consists of:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;16 three-position switches connected to the PLC inputs (only 5 are used)&lt;/li&gt;&#xA;&lt;li&gt;16 LEDs connected to the PLC outputs (not used)&lt;/li&gt;&#xA;&lt;li&gt;a block of four 10-digit rotary encoders connected to the PLC inputs&lt;/li&gt;&#xA;&lt;li&gt;a block of four 7-segment displays connected to the PLC outputs&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;To validate a missile launch, the command chain, consisting of four people, must take turns entering their 4-digit validation PIN code in the correct order on the rotary encoder and then confirm their entry with the corresponding switch.&lt;/p&gt;</description>
    </item>
    <item>
      <title>scampi32</title>
      <link>https://hackropole.fr/en/challenges/reverse/fcsc2026-reverse-scampi32/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/reverse/fcsc2026-reverse-scampi32/</guid>
      <description>&lt;p&gt;Our developper has mistakingly lost his license key. Will you be able to recover it?&#xA;Note: nCPU requires PyTorch to be installed.&lt;/p&gt;</description>
    </item>
    <item>
      <title>SCator</title>
      <link>https://hackropole.fr/en/challenges/hardware/fcsc2026-hardware-scator/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/hardware/fcsc2026-hardware-scator/</guid>
      <description>&lt;p&gt;I was thinking of an AES-128 key, and SCator, the genius, managed to recover my key by observing only 10 executions!&lt;/p&gt;</description>
    </item>
    <item>
      <title>Secure Mood Notes 1/2</title>
      <link>https://hackropole.fr/en/challenges/web/fcsc2026-web-secure-mood-notes-1/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/web/fcsc2026-web-secure-mood-notes-1/</guid>
      <description>&lt;p&gt;Create, edit, delete, or share your notes securely.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Secure Mood Notes 2/2</title>
      <link>https://hackropole.fr/en/challenges/web/fcsc2026-web-secure-mood-notes-2/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/web/fcsc2026-web-secure-mood-notes-2/</guid>
      <description>&lt;p&gt;Create, edit, delete, or share your notes securely.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Shellfish Say</title>
      <link>https://hackropole.fr/en/challenges/web/fcsc2026-web-shellfish-say/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/web/fcsc2026-web-shellfish-say/</guid>
      <description>&lt;p&gt;Finally, the new version of &lt;a href=&#34;https://hackropole.fr/fr/challenges/web/fcsc2025-web-shrimp-say/&#34;&gt;Shrimp Say&lt;/a&gt; has been released! Discover &lt;code&gt;Shellfish Say&lt;/code&gt;!&lt;/p&gt;&#xA;&lt;p&gt;To ask the bot to say something, simply connect using: &lt;code&gt;nc localhost 4000&lt;/code&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Shor</title>
      <link>https://hackropole.fr/en/challenges/crypto/fcsc2026-crypto-shor-1/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/crypto/fcsc2026-crypto-shor-1/</guid>
      <description>&lt;p&gt;After years of dreaming, it finally happened: we got our hands on a top-of-the-line quantum computer.&#xA;Between two attempts to bend space-time (and mine quantum Bitcoin), we figured breaking RSA would be more fun.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Shrimp Saver</title>
      <link>https://hackropole.fr/en/challenges/web/fcsc2026-web-shrimp-saver/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/web/fcsc2026-web-shrimp-saver/</guid>
      <description>&lt;p&gt;Nothing like a little crustacean-based screensaver to brighten up your workstation!&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Warning:&lt;/strong&gt; when testing the challenge, browser addons may interfere with its proper functioning, it is recommended to disable them.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Shrimp WAF</title>
      <link>https://hackropole.fr/en/challenges/web/fcsc2026-web-shrimp-waf/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/web/fcsc2026-web-shrimp-waf/</guid>
      <description>&lt;p&gt;The shrimp is keeping a secret that we absolutely must uncover.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Si proche et pourtant si loin</title>
      <link>https://hackropole.fr/en/challenges/hardware/fcsc2026-hardware-si-proche-et-pourtant-si-loin/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/hardware/fcsc2026-hardware-si-proche-et-pourtant-si-loin/</guid>
      <description>&lt;p&gt;&lt;em&gt;Your neighbor Charlie likes to stay at the cutting edge of technology.&lt;/em&gt;&#xA;She recently installed a strange stone in her refrigerator that regularly measures and transmits temperature, humidity, and atmospheric pressure to her phone. This way, her vegetables are always kept under perfect conditions.&lt;/p&gt;&#xA;&lt;p&gt;&lt;em&gt;Your neighbor Charlie values her privacy.&lt;/em&gt;&#xA;She refuses to transmit the climate data from her refrigerator in plain text to the entire neighborhood.&#xA;To achieve this, a &lt;em&gt;highly secure&lt;/em&gt; system has been implemented to encrypt the measurements.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Spaghetti Badge</title>
      <link>https://hackropole.fr/en/challenges/hardware/fcsc2026-hardware-spaghetti-badge/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/hardware/fcsc2026-hardware-spaghetti-badge/</guid>
      <description>&lt;p&gt;Mr. Spaghetti designed a rather unique light-up badge&amp;hellip; let&amp;rsquo;s just say he didn&amp;rsquo;t wire the LEDs in the most optimal way.&#xA;This badge features a 120x24 WS2812B LED matrix that displays a &lt;em&gt;flag&lt;/em&gt;.&#xA;The microcontroller controlling the LED matrix is a WCH CH32V003F4U6.&lt;/p&gt;&#xA;&lt;p&gt;The PCB fabrication data for this badge and its firmware are available.&#xA;&lt;em&gt;Will you be able to figure out this flag?&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Note&lt;/strong&gt;: The order of the copper layers follows the standard convention, i.e., &lt;code&gt;F.Cu&lt;/code&gt;, &lt;code&gt;In1.Cu&lt;/code&gt;, &lt;code&gt;In2.Cu&lt;/code&gt;, &lt;code&gt;In3.Cu&lt;/code&gt;, &lt;code&gt;In4.Cu&lt;/code&gt; puis &lt;code&gt;B.Cu&lt;/code&gt;.&#xA;The silkscreen Gerber file is not provided; it is up to you to determine the placement and orientation of the components.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Spidersaurus</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-spidersaurus/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-spidersaurus/</guid>
      <description>&lt;p&gt;After a few hiccups with the &lt;a href=&#34;https://hackropole.fr/en/challenges/pwn/fcsc2023-pwn-may-the-forth/&#34;&gt;FORTH&lt;/a&gt; language, as well as the &lt;a href=&#34;https://hackropole.fr/fr/challenges/pwn/fcsc2025-pwn-back-to-basic/&#34;&gt;BASIC&lt;/a&gt; language, our developper has decided to get back to the roots of the multimedia Internet with the help of a JavaScript interpreter, &lt;a href=&#34;https://ftp.mozilla.org/pub/mozilla/source/mozilla-19980603.tar.gz&#34;&gt;SpiderMoney 1.3&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;He assures us that no security vulnerability is exploitable, thanks to compilation flags; furthermore, he guarantees the code is safe from the Y2K bug.&lt;/p&gt;&#xA;&lt;p&gt;However, an anonymous hacker has sent us an enigmatic file &lt;code&gt;test.js&lt;/code&gt; which seems to trigger the read of uninitialized memory. Can you prove our developer wrong by reading the contents of the flag variable?&lt;/p&gt;</description>
    </item>
    <item>
      <title>Spidersaurus Rex</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-spidersaurus-rex/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-spidersaurus-rex/</guid>
      <description>&lt;p&gt;Despite a memory access problem (see the Spidersaurus challenge), our developer insists on using this ancient version of SpiderMonkey.&lt;/p&gt;&#xA;&lt;p&gt;He keeps assuring us there are no exploitable security flaws. However, an anonymous hacker sent us this mysterious message: &amp;ldquo;what happens if a function contains &lt;a href=&#34;https://github.com/ehsan/mozilla-cvs-history/commit/e3ba7ebdb650&#34;&gt;65536 variables&lt;/a&gt;?&amp;rdquo;. Show our developer wrong by reading the contents of &lt;code&gt;flag.txt&lt;/code&gt;.&lt;/p&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;After sending your JavaScript code, use &lt;em&gt;shutdown(socket, SHUT_WR)&lt;/em&gt; to trigger its execution, and then read the potential response.&lt;/li&gt;&#xA;&lt;li&gt;A JavaScript string can contain arbitrary binary content, for instance \u9090\u9090.&lt;/li&gt;&#xA;&lt;li&gt;The memory allocation pattern will differ if the JavaScript code is provided as a file with the first argument, instead of using &lt;em&gt;stdin&lt;/em&gt;.&lt;/li&gt;&#xA;&lt;/ol&gt;</description>
    </item>
    <item>
      <title>Splash Studio</title>
      <link>https://hackropole.fr/en/challenges/web/fcsc2026-web-splash-studio/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/web/fcsc2026-web-splash-studio/</guid>
      <description>&lt;p&gt;&lt;em&gt;Ever dreamed of designing your own underwater companion?&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;Welcome to Splash Studio — the ultimate aquatic creation lab where you can craft the fish of your dreams! Choose from a variety of body shapes, customize those big googly eyes, add flowing fins and fancy tails, slap on some snazzy patterns, pick the perfect color palette, and top it all off with adorable accessories like tiny crowns or distinguished monocles.&lt;/p&gt;&#xA;&lt;p&gt;Name your masterpiece, hit randomize for a surprise, and share your finned friend with the world! 🎨✨&lt;/p&gt;</description>
    </item>
    <item>
      <title>Splhash</title>
      <link>https://hackropole.fr/en/challenges/crypto/fcsc2026-crypto-splhash/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/crypto/fcsc2026-crypto-splhash/</guid>
      <description>&lt;p&gt;You come across a somewhat strange hash function that contains only a single non-linear layer. What an idea!&lt;/p&gt;&#xA;&lt;p&gt;&#xA;&lt;img class=&#34;img-fluid&#34; src=&#34;https://hackropole.fr/challenges/fcsc2026-crypto-splhash/./public/splhash.png&#34; alt=&#34;&#34;&gt;&#xA;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Steel Sentry</title>
      <link>https://hackropole.fr/en/challenges/reverse/fcsc2026-reverse-steel-sentry/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/reverse/fcsc2026-reverse-steel-sentry/</guid>
      <description>&lt;p&gt;The Sentinelle company has developed a revolutionary license control system with wave-based presence verification.&#xA;You are invited to test this new product, &lt;strong&gt;Steel Sentry&lt;/strong&gt;, in order to verify its robustness before purchasing it.&lt;/p&gt;&#xA;&lt;p&gt;Normally, this product is supplied with a hardware component connected to the PC to ensure foolproof protection.&#xA;In your case, and because Sentinelle does not want an overly intrusive security evaluation, you will only be given a test software version.&#xA;To make things even more difficult, the company has configured its license server so that, even if you were to get hold of such a dongle, you still would not be able to pass the verification.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Sur la trace</title>
      <link>https://hackropole.fr/en/challenges/reverse/fcsc2026-reverse-sur-la-trace/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/reverse/fcsc2026-reverse-sur-la-trace/</guid>
      <description>&lt;p&gt;Word of advice: avoid static analysis here.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Revenge of Shor</title>
      <link>https://hackropole.fr/en/challenges/crypto/fcsc2026-crypto-shor-2/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/crypto/fcsc2026-crypto-shor-2/</guid>
      <description>&lt;p&gt;After years of dreaming, it finally happened: we got our hands on a top-of-the-line quantum computer.&#xA;Between two attempts to bend space-time (and mine quantum Bitcoin), we figured breaking RSA would be more fun.&lt;/p&gt;&#xA;&lt;p&gt;&lt;em&gt;Hackropole version of the challenge, compliant with the intended solution.&lt;/em&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>This is fine</title>
      <link>https://hackropole.fr/en/challenges/crypto/fcsc2026-crypto-this-is-fine/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/crypto/fcsc2026-crypto-this-is-fine/</guid>
      <description>&lt;p&gt;&#xA;&lt;img class=&#34;img-fluid&#34; src=&#34;https://hackropole.fr/challenges/fcsc2026-crypto-this-is-fine/public/this-is-fine.jpg&#34; alt=&#34;&#34;&gt;&#xA;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Times Square</title>
      <link>https://hackropole.fr/en/challenges/misc/fcsc2026-misc-times-square/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/misc/fcsc2026-misc-times-square/</guid>
      <description>&lt;p&gt;You are given access to a remote access terminal.&#xA;Quickly find its flag before the system locks up.&lt;/p&gt;&#xA;&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;ssh -o StrictHostKeyChecking=no -p 4000 localhost&#xA;&lt;/code&gt;&lt;/pre&gt;</description>
    </item>
    <item>
      <title>todo</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-todo/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-todo/</guid>
      <description>&lt;p&gt;I created a program to keep track of tasks I shouldn’t forget, but I still feel like my memory is playing tricks on me…&lt;/p&gt;</description>
    </item>
    <item>
      <title>Tortoise Say</title>
      <link>https://hackropole.fr/en/challenges/hardware/fcsc2026-hardware-tortoise-say/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/hardware/fcsc2026-hardware-tortoise-say/</guid>
      <description>&lt;p&gt;After Shrimp Say, here comes Tortoise Say!&lt;/p&gt;&#xA;&lt;p&gt;Tortoise Say is a revolutionary embedded system based on e-Ink technology.&#xA;A drawn turtle eagerly displays a secret for you.&lt;/p&gt;&#xA;&lt;p&gt;We provide you with a capture made using a logic analyzer of the communication with the screen while the turtle was displaying the flag.&#xA;The screen used is a &lt;a href=&#34;https://www.waveshare.com/2.9inch-e-paper-module.htm&#34;&gt;Waveshare 2.9inch e-paper V2&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;The pins measured on the logic analyzer are:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;D0&lt;/code&gt;: &lt;code&gt;DIN&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;code&gt;D1&lt;/code&gt;: &lt;code&gt;CLK&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;code&gt;D2&lt;/code&gt;: &lt;code&gt;CS&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;code&gt;D3&lt;/code&gt;: &lt;code&gt;DC&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;code&gt;D4&lt;/code&gt;: &lt;code&gt;RST&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;code&gt;D5&lt;/code&gt;: &lt;code&gt;BUSY&lt;/code&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;em&gt;Will you be able to recover the turtle&amp;rsquo;s secret?&lt;/em&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Transport me</title>
      <link>https://hackropole.fr/en/challenges/hardware/fcsc2026-hardware-transport-me/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/hardware/fcsc2026-hardware-transport-me/</guid>
      <description>&lt;p&gt;You just got a transport card, but there are only two travels left on it.&#xA;You may interact directly with the card.&#xA;To get the flag, you must be able to travel five times.&lt;/p&gt;&#xA;&lt;p&gt;To interact with the card, connect to the remote service.&lt;/p&gt;&#xA;&lt;p&gt;&#xA;&lt;img class=&#34;img-fluid&#34; src=&#34;https://hackropole.fr/challenges/fcsc2026-hardware-transport-me/./public/transport-me.png&#34; alt=&#34;&#34;&gt;&#xA;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Transport me too</title>
      <link>https://hackropole.fr/en/challenges/hardware/fcsc2026-hardware-transport-me-too/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/hardware/fcsc2026-hardware-transport-me-too/</guid>
      <description>&lt;p&gt;You just got a transport card based on a chip ST25TB512AC from STMicroElectronics.&#xA;Apparently, this card initially contained 10 tickets, but cannot be reloaded.&#xA;The person who gave you this card already used 5 tickets.&lt;/p&gt;&#xA;&lt;p&gt;Can you travel 1000 times ?&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Note&lt;/strong&gt;: When sending a raw command to the card, consider that it is alreadt selected by the reader.&lt;/p&gt;&#xA;&lt;p&gt;&#xA;&lt;img class=&#34;img-fluid&#34; src=&#34;https://hackropole.fr/challenges/fcsc2026-hardware-transport-me-too/./public/transport-me.png&#34; alt=&#34;&#34;&gt;&#xA;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Tunnel Routier 1/2</title>
      <link>https://hackropole.fr/en/challenges/misc/fcsc2026-misc-tunnel-routier-1/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/misc/fcsc2026-misc-tunnel-routier-1/</guid>
      <description>&lt;p&gt;The 5-kilometre-long Grenelle Tunnel is due to be officially opened today, and local officials have travelled to the site to attend its inaugural opening.&#xA;The tunnel&amp;rsquo;s control system is managed by a programmable logic controller (PLC) that communicates with the SCADA system via an industrial protocol on TCP/4502. This system regulates process parameters to ensure a safe journey through the tunnel for users. The process parameters regulated by this PLC are as follows:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Tunnel Routier 2/2</title>
      <link>https://hackropole.fr/en/challenges/misc/fcsc2026-misc-tunnel-routier-2/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/misc/fcsc2026-misc-tunnel-routier-2/</guid>
      <description>&lt;p&gt;The 5-kilometre-long Grenelle Tunnel is due to be officially opened today, and local officials have travelled to the site to attend its inaugural opening.&#xA;The tunnel&amp;rsquo;s control system is managed by a programmable logic controller (PLC) that communicates with the SCADA system via an industrial protocol on TCP/4502. This system regulates process parameters to ensure a safe journey through the tunnel for users. The process parameters regulated by this PLC are as follows:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Veggie Dino</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-veggie-dino/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-veggie-dino/</guid>
      <description>&lt;p&gt;You find a game on an old TI-83+ calculator in the attic.&#xA;It was said to be impossible to finish. Can you succeed where your parents failed ?&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; the expected flag is a URL starting by &lt;code&gt;https://fcsc.fr/&lt;/code&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Web Logs</title>
      <link>https://hackropole.fr/en/challenges/forensics/fcsc2026-forensics-web-logs/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/forensics/fcsc2026-forensics-web-logs/</guid>
      <description>&lt;p&gt;You have access to the logs of a web server exposed to the Internet. Due to its public exposure, various attack attempts are present in the logs.&lt;/p&gt;&#xA;&lt;p&gt;Find the CWE ID of the successful attack in this web server&amp;rsquo;s logs (e.g., CWE-79). Give the date the attack was successful (format: MM/DD). Give the requested routes for which the attack was successful. The requests must be in chronological order, separated by hyphens &amp;lsquo;-&amp;rsquo; (e.g., /var/log/access.log-/index?params=value).&lt;/p&gt;</description>
    </item>
    <item>
      <title>Wiretrace</title>
      <link>https://hackropole.fr/en/challenges/hardware/fcsc2026-hardware-wiretrace/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/hardware/fcsc2026-hardware-wiretrace/</guid>
      <description>&lt;p&gt;We pulled off a masterstroke, namely distributing secure phones to a large criminal organization,&#xA;while having introduced a backdoor into them.&lt;/p&gt;&#xA;&lt;p&gt;The vulnerability lies in the hardware accelerator responsible for modular computations.&#xA;It produces a log of the computations performed, stored in dedicated memory and retrievable locally via a wireless exchange.&#xA;The hardware-level modification ensures the backdoor remains even if the software is changed.&lt;/p&gt;&#xA;&lt;p&gt;We provide the documentation for the hardware accelerator.&lt;/p&gt;</description>
    </item>
    <item>
      <title>wsd</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-wsd/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-wsd/</guid>
      <description>&lt;p&gt;You loved the HTTP trilogy, so let me introduce &lt;code&gt;wsd&lt;/code&gt;: it’s almost the same, but different.&lt;/p&gt;&#xA;&lt;p&gt;Retrieve the flag from &lt;code&gt;/app/flag.txt&lt;/code&gt;.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
