<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>shellcode on Hackropole</title>
    <link>https://hackropole.fr/en/shellcode/</link>
    <description>Recent content in shellcode on Hackropole</description>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Fri, 18 Apr 2025 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://hackropole.fr/en/shellcode/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Bigorneau</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2025-pwn-bigorneau/</link>
      <pubDate>Mon, 28 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2025-pwn-bigorneau/</guid>
      <description>&lt;p&gt;We often try to obtain shellcodes with strange constraints, either in size, alphanumeric, etc.&#xA;Here, we&amp;rsquo;re attempting a new weird constraint for an x64 shellcode: you are only allowed to use 6 different byte values (i.e., &lt;code&gt;len(set(shellcode)) &amp;lt;= 6&lt;/code&gt;)!&lt;/p&gt;</description>
    </item>
    <item>
      <title>Long Prime Shellcode</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2025-pwn-long-prime-shellcode/</link>
      <pubDate>Mon, 28 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2025-pwn-long-prime-shellcode/</guid>
      <description>&lt;p&gt;After &lt;a href=&#34;https://hackropole.fr/en/challenges/pwn/fcsc2021-pwn-encrypted-shellcode/&#34;&gt;&lt;code&gt;Encrypted Shellcode&lt;/code&gt;&lt;/a&gt; and &lt;a href=&#34;https://hackropole.fr/en/challenges/pwn/fcsc2024-pwn-hashed-shellcode/&#34;&gt;&lt;code&gt;Hashed Shellcode&lt;/code&gt;&lt;/a&gt;, why not play with a large prime number? :-)&lt;/p&gt;&#xA;&lt;p&gt;This challenge exists in a more difficult version: &lt;a href=&#34;https://hackropole.fr/en/challenges/pwn/fcsc2025-pwn-small-primes-shellcode/&#34;&gt;&lt;code&gt;Small Prime Shellcode&lt;/code&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Small Primes Shellcode</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2025-pwn-small-primes-shellcode/</link>
      <pubDate>Mon, 28 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2025-pwn-small-primes-shellcode/</guid>
      <description>&lt;p&gt;The &lt;a href=&#34;https://hackropole.fr/en/challenges/pwn/fcsc2025-pwn-long-prime-shellcode/&#34;&gt;version&lt;/a&gt; with just one large prime number was too easy, right?&#xA;Here&amp;rsquo;s another one with more constraints :-)&lt;/p&gt;</description>
    </item>
    <item>
      <title>Hashed Shellcode</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2024-pwn-hashed-shellcode/</link>
      <pubDate>Mon, 15 Apr 2024 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2024-pwn-hashed-shellcode/</guid>
      <description>&lt;p&gt;Did you enjoy the &lt;a href=&#34;https://hackropole.fr/en/challenges/pwn/fcsc2021-pwn-encrypted-shellcode/&#34;&gt;&lt;code&gt;Encrypted Shellcode&lt;/code&gt;&lt;/a&gt; challenge from FCSC 2021?&#xA;Guess what?&#xA;Here is a variant using a hash function!&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Note :&lt;/strong&gt; the Docker image base on the remote service is &lt;code&gt;debian:bookworm-slim&lt;/code&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Keskidi</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2023-pwn-keskidi/</link>
      <pubDate>Mon, 25 Dec 2023 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2023-pwn-keskidi/</guid>
      <description>&lt;p&gt;&lt;em&gt;Pwn this!&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Warning :&lt;/strong&gt; the remote connection closes after 60 seconds.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Palindrome</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2022-pwn-palindrome/</link>
      <pubDate>Fri, 01 Dec 2023 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2022-pwn-palindrome/</guid>
      <description>&lt;p&gt;Here is a shellcoding exercice as you like it! [At least I hope you do :-)]&lt;/p&gt;&#xA;&lt;p&gt;A more complex variant of this challenge is available here: &lt;a href=&#34;https://hackropole.fr/en/challenges/pwn/fcsc2022-pwn-palindrome-harder/&#34;&gt;Palindrome (Harder)&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Palindrome (Harder)</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2022-pwn-palindrome-harder/</link>
      <pubDate>Fri, 01 Dec 2023 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2022-pwn-palindrome-harder/</guid>
      <description>&lt;p&gt;Here is a shellcoding exercice as you like it! [At least I hope you do :-)]&lt;/p&gt;&#xA;&lt;p&gt;A simpler variant of this challenge is available here: &lt;a href=&#34;https://hackropole.fr/en/challenges/pwn/fcsc2022-pwn-palindrome/&#34;&gt;Palindrome&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Shellcode</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2022-pwn-shellcode/</link>
      <pubDate>Fri, 15 Dec 2023 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2022-pwn-shellcode/</guid>
      <description>&lt;p&gt;Do you know what a &lt;em&gt;shellcode&lt;/em&gt; is?&lt;/p&gt;</description>
    </item>
    <item>
      <title>asmophile</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2021-pwn-asmophile/</link>
      <pubDate>Fri, 22 Dec 2023 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2021-pwn-asmophile/</guid>
      <description>&lt;p&gt;How well do you known x64 assembly?&lt;/p&gt;</description>
    </item>
    <item>
      <title>Encrypted Shellcode</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2021-pwn-encrypted-shellcode/</link>
      <pubDate>Tue, 19 Dec 2023 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2021-pwn-encrypted-shellcode/</guid>
      <description>&lt;p&gt;During an autit, you found these files and those commands:&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-sh&#34; data-lang=&#34;sh&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;$ dd &lt;span class=&#34;k&#34;&gt;if&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;=&lt;/span&gt;/dev/urandom &lt;span class=&#34;nv&#34;&gt;of&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;=&lt;/span&gt;key.bin &lt;span class=&#34;nv&#34;&gt;bs&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;=&lt;/span&gt;&lt;span class=&#34;m&#34;&gt;16&lt;/span&gt; &lt;span class=&#34;nv&#34;&gt;count&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;=&lt;/span&gt;&lt;span class=&#34;m&#34;&gt;1&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;$ ./esc -e &amp;lt; stereogram.png &amp;gt; stereogram.png.enc&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;$ ./esc &amp;lt; stereogram.png&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;&amp;gt;&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; Done encrypting &lt;span class=&#34;m&#34;&gt;1280731&lt;/span&gt; bytes.&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;2&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt;    &lt;span class=&#34;m&#34;&gt;11735&lt;/span&gt; segmentation fault  ./esc &amp;lt; stereogram.png&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;It seems that this crash has been exploited: can you figure out how and read &lt;code&gt;flag.txt&lt;/code&gt;?&lt;/p&gt;&#xA;&lt;p&gt;You don&amp;rsquo;t have &lt;code&gt;key.bin&lt;/code&gt;, but the service provided gives access to &lt;code&gt;esc&lt;/code&gt; (without arguments) using the same &lt;code&gt;key.bin&lt;/code&gt; file as the one generated by the above command.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Risky Business</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2020-pwn-risky-business/</link>
      <pubDate>Tue, 19 Dec 2023 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2020-pwn-risky-business/</guid>
      <description>&lt;p&gt;The challenge is not very risky: simply read the content of &lt;code&gt;flag.txt&lt;/code&gt;.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
