Files
hacklab/2/bonus1/BRIEFING.txt
2025-12-15 13:31:12 +01:00

67 lines
1.8 KiB
Plaintext
Raw Permalink Blame History

This file contains invisible Unicode characters
This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
TUBS README ISS
1. Introduction
This challenge consists of an obfuscated program, which out-
puts 512 bytes, most of which are generated randomly. 32
bytes, however, are not generated by an prng. Those 32 bytes
representated as hex values make up the secret, necessary to
acquire the flag.
The goal of this challenge is to find the randomness intro-
ducing instructions and patch them such, that the prng out-
put is constant 0. An example output may look like this:
1b c3 fa 7a 3a d0 97 6c
a2 b4 29 fb dc d1 d1 39
c0 58 e2 1b 9a f8 3f dc
31 b4 1d 0d 19 d0 ac 2e
36 4a 4c 51 40 5a 33 8c
. . . . . . . .
. . . . . . . .
. . . . . . . .
86 f9 61 95 fa 9e 94 c4
41 7e 0a 8c e3 db f9 3e
7a 1d 28 95 22 31 f2 0e
3b 54 c0 b2 b0 1a 52 77
e6 1f 84 f2 25 99 d5 25
After successfully disabling the random number source, the
output may look like this:
00 00 af 00 00 00 00 00
00 00 00 00 56 00 00 00
ff 00 00 00 00 00 00 00
00 00 00 00 01 00 00 00
00 00 00 00 00 00 00 3e
. . . . . . . .
. . . . . . . .
. . . . . . . .
00 aa 00 00 00 00 00 00
00 00 67 00 00 00 00 00
80 00 00 00 00 00 00 00
00 00 00 00 00 10 00 00
00 00 00 00 00 00 c9 00
In that case the flag can be acquired by running the command
"get_token af56ff013e...aa678010c9" on the VM.
TUBS 1