RE - Infiltration

300 points | 807 solves

Description

We got a hold of an internal communication tool being used by the elves, and managed to hook it up to their server. However, it won't let us see their secrets? Can you take a look inside?

Downloads

Solution

I solved this by stepping through GDB debugger. The program takes in 2 arguments, IP address and port number of the server. To pass arguments to the program in GDB, use the --args flag.

gdb --args executable_name arg1 arg2

Dynamic analysis reveals that the program receives the flag in plaintext from the server.

Flag in the stack

Flag: HTB{n0t_qu1t3_s0_0p4qu3}

Bonus

After reading writeups post-CTF I realised there is an even easier method which is to use strace.

We can see the flag in the recvfrom() function.

Last updated