<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>logic on Hackropole</title>
    <link>https://hackropole.fr/en/logic/</link>
    <description>Recent content in logic on Hackropole</description>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Fri, 03 Apr 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://hackropole.fr/en/logic/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>autodiag</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-autodiag/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-autodiag/</guid>
      <description>&lt;p&gt;This debug port looks promising.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Super Factorizer</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2024-pwn-super-factorizer/</link>
      <pubDate>Mon, 15 Apr 2024 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2024-pwn-super-factorizer/</guid>
      <description>&lt;p&gt;I think crypto people are being a bit too clever.&#xA;I can factor numbers too!&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; the command to execute the binary server-side is: &lt;code&gt;timeout -k 121 120 stdbuf -o0 /app/super-factorizer&lt;/code&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>May the Fifth</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2023-pwn-may-the-fifth/</link>
      <pubDate>Mon, 25 Dec 2023 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2023-pwn-may-the-fifth/</guid>
      <description>&lt;p&gt;A &lt;code&gt;zForth&lt;/code&gt; user has, for performance reasons, disabled ASAN and &lt;code&gt;ZF_ENABLE_BOUNDARY_CHECKS&lt;/code&gt;,&#xA;because according to him &amp;ldquo;setjmp/longjmp is disabled and that is good enough&amp;rdquo;.&#xA;Can you prove him wrong by reading the contents of the file containing the flag?&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; A simpler variant of this challenge is available here: &lt;a href=&#34;https://hackropole.fr/en/challenges/pwn/fcsc2023-pwn-may-the-forth/&#34;&gt;May The Forth&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Bonus Points</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2021-pwn-bonus-points/</link>
      <pubDate>Fri, 08 Dec 2023 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2021-pwn-bonus-points/</guid>
      <description>&lt;p&gt;Do you want some additional bonus points?&#xA;Get a score higher than 1000 to unlock the flag.&lt;/p&gt;</description>
    </item>
    <item>
      <title>RsaCE</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2020-pwn-rsace/</link>
      <pubDate>Fri, 01 Dec 2023 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2020-pwn-rsace/</guid>
      <description>&lt;p&gt;You have found this binary service which allows to execute signed commands on the remote server.&#xA;You have also gotten your hands on an example that allows you to execute the &lt;code&gt;id&lt;/code&gt; command on the server.&#xA;Your goal is to get a shell on this server.&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; This challenge has been made for the finale of FCSC 2020.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
