Page cover

Informational

In this CTF exists a client-client binary integrity system. This means that the program will be remotely fetching a production hash (placed there by the developers) on a remote server somewhere. Your goal for this section is to...

  • 1: Find the remote location where the hash is given

  • 2: Find the file that is written to

  • 3: Find the hashing algorithm

  • 4: Find out how to bypass the security system to make patches

When we do get passed all of this, it will be a bit easier to maneuver to further levels.

Last updated