fabio42 / police-quest

Binary exploitation CTF challenge

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Police Quest CTF Challenge

This repo contains a CTF challenge written by me (TheColonial). It's a 64-bit Linux binary with a few quirks. I hope you enjoy it. More detail can be found in this blog post.

Rules

In a real CTF, you wouldn't be able to attach to the running Docker container to get access to the internals of the OS. Please don't ruin it for yourselves, and resist the temptation to look inside. It's possible to solve this without the cheating!

Getting the Challenge

Clone this repo: git clone https://github.com/OJ/police-quest

The Goal

Read the flag from the target.

The Binary

The target binary is police_quest, it's in the root of this repo. Static and dynamic analysis should be done on this binary, as it's the one that runs inside the target docker container.

Running

Run the challenge in the Docker container by running make (works on Linux and OSX). If you're on Windows, just run docker-compose up and you should be good to go. From there you can talk to the binary by:

$ nc localhost 10100

Don't use telnet, it messes with line endings. Have at it!

About

Binary exploitation CTF challenge

License:Apache License 2.0


Languages

Language:Makefile 100.0%