<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>stack on Hackropole</title>
    <link>https://hackropole.fr/en/stack/</link>
    <description>Recent content in stack on Hackropole</description>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Fri, 03 Apr 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://hackropole.fr/en/stack/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>boring</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-boring/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-boring/</guid>
      <description>&lt;p&gt;JSON format is pretty boring, don’t you think?&#xA;A binary representation is immediately more fun!&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; This challenge is the first part of the &lt;code&gt;Not So Boring&lt;/code&gt; challenge.&lt;/p&gt;</description>
    </item>
    <item>
      <title>History</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-history/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-history/</guid>
      <description>&lt;p&gt;Here is an implementation of logging (history) of entered commands.&#xA;Do not worry, the commands are not interpreted.&#xA;Read the file &lt;code&gt;flag.txt&lt;/code&gt; located on the server.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Not So Boring</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-not-so-boring/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-not-so-boring/</guid>
      <description>&lt;p&gt;I was informed that the first version of my program contained vulnerabilities…&#xA;However, fixing them would be quite tedious and I don&amp;rsquo;t really have the time.&lt;/p&gt;&#xA;&lt;p&gt;But I still developed my own sandbox so that it can no longer be compromised &amp;ndash; a much more fun idea!&#xA;Even LLMs haven&amp;rsquo;t found any vulnerabilities in its code.&lt;/p&gt;&#xA;&lt;p&gt;Find a way to escape the sandbox and obtain the flag by executing &lt;code&gt;/getflag&lt;/code&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Puissance 4</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-puissance4/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-puissance4/</guid>
      <description>&lt;p&gt;If you succeeded with the &amp;ldquo;baby version, now try this one, which is just a tiny bit more complex.&#xA;Your goal is still to read the &lt;code&gt;flag.txt&lt;/code&gt; file located on the server.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Puissance 4 (baby)</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-puissance4-baby/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-puissance4-baby/</guid>
      <description>&lt;p&gt;Will you be able to win at Connect Four against a dumb AI?&#xA;And if so, you can then try to read the &lt;code&gt;flag.txt&lt;/code&gt; file located on the server.&lt;/p&gt;</description>
    </item>
    <item>
      <title>todo</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-todo/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2026-pwn-todo/</guid>
      <description>&lt;p&gt;I created a program to keep track of tasks I shouldn’t forget, but I still feel like my memory is playing tricks on me…&lt;/p&gt;</description>
    </item>
    <item>
      <title>Swift Encryptor</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2025-pwn-swift-encryptor/</link>
      <pubDate>Mon, 28 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2025-pwn-swift-encryptor/</guid>
      <description>&lt;p&gt;&lt;strong&gt;!!! New !!!&lt;/strong&gt; Ultra-modern encryption service:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;em&gt;Military grade&lt;/em&gt; post-quantum cryptographic algorithms!&lt;/li&gt;&#xA;&lt;li&gt;Ultra-fast multi-threading!&lt;/li&gt;&#xA;&lt;li&gt;Protection against memory corruption!&lt;/li&gt;&#xA;&lt;/ul&gt;</description>
    </item>
    <item>
      <title>XORTP</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2025-pwn-xortp/</link>
      <pubDate>Mon, 28 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2025-pwn-xortp/</guid>
      <description>&lt;p&gt;You can encrypt any file on the system with an unbreakable mechanism worthy of the greatest!&lt;/p&gt;</description>
    </item>
    <item>
      <title>yabof</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2025-pwn-yabof/</link>
      <pubDate>Mon, 28 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2025-pwn-yabof/</guid>
      <description>&lt;p&gt;Yet Another Buffer Overflow!&lt;/p&gt;&#xA;&lt;p&gt;&#xA;&lt;img class=&#34;img-fluid&#34; src=&#34;https://hackropole.fr/challenges/fcsc2025-pwn-yabof/public/yabof.jpeg&#34; alt=&#34;&#34;&gt;&#xA;&lt;/p&gt;</description>
    </item>
    <item>
      <title>yapuka</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2025-pwn-yapuka/</link>
      <pubDate>Mon, 28 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2025-pwn-yapuka/</guid>
      <description>&lt;p&gt;You have everything, let&amp;rsquo;s go!&lt;/p&gt;</description>
    </item>
    <item>
      <title>Blind Attack</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2024-pwn-blind-attack/</link>
      <pubDate>Mon, 15 Apr 2024 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2024-pwn-blind-attack/</guid>
      <description>&lt;p&gt;You are playing your first &lt;a href=&#34;https://2023.faustctf.net/information/attackdefense-for-beginners/&#34;&gt;Attack/Defense CTF&lt;/a&gt;, and&amp;hellip; everyone is panicking!&#xA;The game is barely 45 minutes old, and your team is under attack from all sides, with all services down except one: you don&amp;rsquo;t know whether to patch, attack, or just go back to being a normal human being and give up. Your mind is going crazy, you&amp;rsquo;re feeling fuzzy, you don&amp;rsquo;t know what your name is anymore.&lt;/p&gt;&#xA;&lt;p&gt;You drink another cup of coffee (okay, given the stress, not the best idea), but you decide to open your team network flow analysis tool. This tool (&lt;a href=&#34;https://github.com/ANSSI-FR/shovel/&#34;&gt;Shovel&lt;/a&gt;) enables you to view all TCP/UDP flows passing through the machine you&amp;rsquo;re defending. You are in charge of the service called &lt;code&gt;blind&lt;/code&gt;, and without even looking at the code of this service, you decide to simply reproduce the attacks that other teams are using to steal your flags.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Call Me Blah</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2024-pwn-call-me-blah/</link>
      <pubDate>Mon, 15 Apr 2024 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2024-pwn-call-me-blah/</guid>
      <description>&lt;p&gt;We&amp;rsquo;re putting you in the typical situation of post-exploitation.&#xA;Can you get a shell?&lt;/p&gt;</description>
    </item>
    <item>
      <title>Note a Bug (d0g bUt h4ppY)</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2024-pwn-note-a-bug-2/</link>
      <pubDate>Mon, 15 Apr 2024 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2024-pwn-note-a-bug-2/</guid>
      <description>&lt;p&gt;You continue to play your first &lt;a href=&#34;https://2023.faustctf.net/information/attackdefense-for-beginners/&#34;&gt;Attack/Defense CTF&lt;/a&gt;: it&amp;rsquo;s a little less panicky than an hour ago, but your self-esteem is still taking a beating. So much so, in fact, that you&amp;rsquo;re beginning to wonder whether all the time you&amp;rsquo;ve invested in training on Hackropole has been worthwhile&amp;hellip;&lt;/p&gt;&#xA;&lt;p&gt;It&amp;rsquo;s not all doom and gloom: you&amp;rsquo;re beginning to master network analysis, hardening techniques and you&amp;rsquo;re even submitting false flags in other teams&amp;rsquo; services to fool the enemy! You&amp;rsquo;ve even learned to steal exploits from other teams very quickly, without even bothering to look at the services&amp;rsquo; code!&lt;/p&gt;</description>
    </item>
    <item>
      <title>Note a Bug (Nordic Mollusks)</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2024-pwn-note-a-bug-3/</link>
      <pubDate>Mon, 15 Apr 2024 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2024-pwn-note-a-bug-3/</guid>
      <description>&lt;p&gt;You continue to play your first &lt;a href=&#34;https://2023.faustctf.net/information/attackdefense-for-beginners/&#34;&gt;Attack/Defense CTF&lt;/a&gt;: it&amp;rsquo;s a little less panicky than an hour ago, but your self-esteem is still taking a beating. So much so, in fact, that you&amp;rsquo;re beginning to wonder whether all the time you&amp;rsquo;ve invested in training on Hackropole has been worthwhile&amp;hellip;&lt;/p&gt;&#xA;&lt;p&gt;It&amp;rsquo;s not all doom and gloom: you&amp;rsquo;re beginning to master network analysis, hardening techniques and you&amp;rsquo;re even submitting false flags in other teams&amp;rsquo; services to fool the enemy! You&amp;rsquo;ve even learned to steal exploits from other teams very quickly, without even bothering to look at the services&amp;rsquo; code!&lt;/p&gt;</description>
    </item>
    <item>
      <title>Note a Bug (Red Beer)</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2024-pwn-note-a-bug-1/</link>
      <pubDate>Mon, 15 Apr 2024 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2024-pwn-note-a-bug-1/</guid>
      <description>&lt;p&gt;You continue to play your first &lt;a href=&#34;https://2023.faustctf.net/information/attackdefense-for-beginners/&#34;&gt;Attack/Defense CTF&lt;/a&gt;: it&amp;rsquo;s a little less panicky than an hour ago, but your self-esteem is still taking a beating. So much so, in fact, that you&amp;rsquo;re beginning to wonder whether all the time you&amp;rsquo;ve invested in training on Hackropole has been worthwhile&amp;hellip;&lt;/p&gt;&#xA;&lt;p&gt;It&amp;rsquo;s not all doom and gloom: you&amp;rsquo;re beginning to master network analysis, hardening techniques and you&amp;rsquo;re even submitting false flags in other teams&amp;rsquo; services to fool the enemy! You&amp;rsquo;ve even learned to steal exploits from other teams very quickly, without even bothering to look at the services&amp;rsquo; code!&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTTP 2</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2023-pwn-http2/</link>
      <pubDate>Mon, 25 Dec 2023 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2023-pwn-http2/</guid>
      <description>&lt;p&gt;Oh no no, this is not HTTP/2 at all!&#xA;This HTTP version 2.&#xA;Well, you know.&lt;/p&gt;</description>
    </item>
    <item>
      <title>May the Forth</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2023-pwn-may-the-forth/</link>
      <pubDate>Mon, 25 Dec 2023 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2023-pwn-may-the-forth/</guid>
      <description>&lt;p&gt;A zForth user refuses to update his installation, because he says &amp;lsquo;it is useless&amp;rsquo;.&#xA;Can you convince him to do it anyway by finding the flag in the interpreter environment (variable &lt;code&gt;FLAG&lt;/code&gt;)?&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; A more complex variant of this challenge is available here: &lt;a href=&#34;https://hackropole.fr/en/challenges/pwn/fcsc2023-pwn-may-the-fifth/&#34;&gt;May The Fifth&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Ptérodactyle</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2023-pwn-pterodactyle/</link>
      <pubDate>Mon, 25 Dec 2023 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2023-pwn-pterodactyle/</guid>
      <description>&lt;p&gt;You must display the content of the file &lt;code&gt;flag.txt&lt;/code&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>pwnduino</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2023-pwn-pwnduino/</link>
      <pubDate>Mon, 25 Dec 2023 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2023-pwn-pwnduino/</guid>
      <description>&lt;p&gt;An AVR board is used in a SCADA access control system. It contains a dedicated firmware that implements&#xA;computations on a secret stored in the internal memory of the microcontroler: this secret must not leave it.&#xA;In order to execute these computations, it is necessary to prove an authentication password. The console will&#xA;be disconnected after 10 seconds of inactivity.&lt;/p&gt;&#xA;&lt;p&gt;During an audit mission, you are asked to evaluate the security of this system, and to validate that the&#xA;sensitive secret does not leak. You have been able to access a development server containing a debug binary&#xA;and its source code. Using this information, you are confident that it is possible to recover the&#xA;production firmware secret!&lt;/p&gt;</description>
    </item>
    <item>
      <title>uid</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2023-pwn-uid/</link>
      <pubDate>Fri, 22 Dec 2023 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2023-pwn-uid/</guid>
      <description>&lt;p&gt;You are asked to use the provided binary to read the &lt;code&gt;flag.txt&lt;/code&gt; file located on the remote server.&lt;/p&gt;</description>
    </item>
    <item>
      <title>deflation</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2022-pwn-deflation/</link>
      <pubDate>Fri, 01 Dec 2023 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2022-pwn-deflation/</guid>
      <description>&lt;p&gt;You need to read the file &lt;code&gt;flag.txt&lt;/code&gt; on the remote server.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dépassement de tampon</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2022-pwn-depassement-de-tampon/</link>
      <pubDate>Mon, 25 Dec 2023 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2022-pwn-depassement-de-tampon/</guid>
      <description>&lt;p&gt;Exploit the given binary to read the file &lt;code&gt;flag&lt;/code&gt; on the remote server.&lt;/p&gt;</description>
    </item>
    <item>
      <title>httpd</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2022-pwn-httpd/</link>
      <pubDate>Mon, 25 Dec 2023 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2022-pwn-httpd/</guid>
      <description>&lt;p&gt;Audit and exploit this sandboxed web server.&lt;/p&gt;</description>
    </item>
    <item>
      <title>microroptor</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2022-pwn-microroptor/</link>
      <pubDate>Fri, 01 Dec 2023 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2022-pwn-microroptor/</guid>
      <description>&lt;p&gt;Exploit the provided binary to read the &lt;code&gt;flag&lt;/code&gt; file on the remote server.&lt;/p&gt;&#xA;&lt;p&gt;&#xA;&lt;img class=&#34;img-fluid&#34; src=&#34;https://hackropole.fr/challenges/fcsc2022-pwn-microroptor/public/badpun.jpeg&#34; alt=&#34;&#34;&gt;&#xA;&lt;/p&gt;</description>
    </item>
    <item>
      <title>XORaaS</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2022-pwn-xoraas/</link>
      <pubDate>Fri, 01 Dec 2023 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2022-pwn-xoraas/</guid>
      <description>&lt;p&gt;You need to read the file &lt;code&gt;flag.txt&lt;/code&gt; on the remote server.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Blind Date</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2021-pwn-blind-date/</link>
      <pubDate>Fri, 15 Dec 2023 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2021-pwn-blind-date/</guid>
      <description>&lt;p&gt;A company wants to create an online service that protects their customers&amp;rsquo; information.&#xA;Can you show them that it is not secure by reading the &lt;code&gt;flag.txt&lt;/code&gt; file on their server?&#xA;The managers of this company did not want to give you the source code of their solution, nor the compiled binary, but they only offer you a remote access to their service.&lt;/p&gt;</description>
    </item>
    <item>
      <title>bofbof</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2021-pwn-bofbof/</link>
      <pubDate>Fri, 01 Dec 2023 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2021-pwn-bofbof/</guid>
      <description>&lt;p&gt;Get a shell on the remote machine to read &lt;code&gt;flag.txt&lt;/code&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Itsy Mipsy Router</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2021-pwn-itsy-mipsy-router/</link>
      <pubDate>Fri, 01 Dec 2023 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2021-pwn-itsy-mipsy-router/</guid>
      <description>&lt;p&gt;You need to audit a router at the interface between the Internet and a company&amp;rsquo;s internal network.&#xA;The client asks you whether it is possible to read the files stored on the &lt;code&gt;filer&lt;/code&gt; machine that acts as a HTTP file server.&#xA;A minimal Dockerfile is provided to help you in the analysis.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Reporter</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2021-pwn-reporter/</link>
      <pubDate>Fri, 22 Dec 2023 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2021-pwn-reporter/</guid>
      <description>&lt;p&gt;This is your first day in your new company, where they use an homemade browser.&#xA;Can you get a shell on the machine of the person who checks the links we send him?&lt;/p&gt;</description>
    </item>
    <item>
      <title>Hello Rootkitty</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2020-pwn-hello-rootkitty/</link>
      <pubDate>Tue, 12 Dec 2023 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2020-pwn-hello-rootkitty/</guid>
      <description>&lt;p&gt;A machine has been infected with the rootkit &lt;code&gt;Hello Rootkitty&lt;/code&gt;, which prevents certain files from being read.&#xA;Your mission is to help the victim recover the content of the affected files.&#xA;Once you are connected to SSH (credentials: &lt;code&gt;ctf:ctf&lt;/code&gt;), run &lt;code&gt;./wrapper&lt;/code&gt; to start the challenge.&lt;/p&gt;&#xA;&lt;p&gt;A more complex variant of this challenge is available here: &lt;a href=&#34;https://hackropole.fr/en/challenges/pwn/fcsc2020-pwn-hello-rootkitty-harder/&#34;&gt;Hello Rootkitty (Harder)&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Hello Rootkitty (Harder)</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2020-pwn-hello-rootkitty-harder/</link>
      <pubDate>Tue, 12 Dec 2023 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2020-pwn-hello-rootkitty-harder/</guid>
      <description>&lt;p&gt;A machine has been infected with the rootkit &lt;code&gt;Hello Rootkitty&lt;/code&gt;, which prevents certain files from being read.&#xA;Your mission is to help the victim recover the content of the affected files.&#xA;Once you are connected to SSH (credentials: &lt;code&gt;ctf:ctf&lt;/code&gt;), run &lt;code&gt;./wrapper&lt;/code&gt; to start the challenge.&lt;/p&gt;&#xA;&lt;p&gt;A simpler variant of this challenge is available here: &lt;a href=&#34;https://hackropole.fr/en/challenges/pwn/fcsc2020-pwn-hello-rootkitty/&#34;&gt;Hello Rootkitty&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Bonus:&lt;/strong&gt; Can you get a &lt;code&gt;root&lt;/code&gt; shell?&lt;/p&gt;</description>
    </item>
    <item>
      <title>Poney</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2020-pwn-poney/</link>
      <pubDate>Fri, 01 Dec 2023 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2020-pwn-poney/</guid>
      <description>&lt;p&gt;You need to read the file &lt;code&gt;flag.txt&lt;/code&gt; on the remote system.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Tik Tak Tok</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2020-pwn-tik-tak-tok/</link>
      <pubDate>Fri, 01 Dec 2023 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2020-pwn-tik-tak-tok/</guid>
      <description>&lt;p&gt;You need to read the content of the file &lt;code&gt;flag&lt;/code&gt; on the remote service.&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; This challenge has been made for the finale of FCSC 2020.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Armory</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2019-pwn-armory/</link>
      <pubDate>Tue, 05 Dec 2023 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2019-pwn-armory/</guid>
      <description>&lt;p&gt;Pwn the binary provided to extract the flag from the remote service.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Harmless</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2019-pwn-harmless/</link>
      <pubDate>Fri, 08 Dec 2023 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2019-pwn-harmless/</guid>
      <description>&lt;p&gt;Pwn the binary provided to read the flag on the remote service.&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; This challenge has been made for the finale of FCSC 2019.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Hola Armigo</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2019-pwn-hola-armigo/</link>
      <pubDate>Tue, 12 Dec 2023 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2019-pwn-hola-armigo/</guid>
      <description>&lt;p&gt;Pwn the binary provided to read the flag on the remote service.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Secure Vault</title>
      <link>https://hackropole.fr/en/challenges/pwn/fcsc2019-pwn-secure-vault/</link>
      <pubDate>Tue, 05 Dec 2023 00:00:00 +0000</pubDate>
      <guid>https://hackropole.fr/en/challenges/pwn/fcsc2019-pwn-secure-vault/</guid>
      <description>&lt;p&gt;The company &lt;code&gt;Secure Vault&lt;/code&gt; contacted us after someone stole some information on one of their servers.&#xA;Can you prove to them that you can indeed read the &lt;code&gt;flag&lt;/code&gt; file?&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; No binary is provided for this challenge.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
