Informational
In this CTF exists a client-client binary integrity system. This means that the program will be remotely fetching a production hash (placed there by the developers) on a remote server somewhere. Your goal for this section is to...
1: Find the remote location where the hash is given
2: Find the file that is written to
3: Find the hashing algorithm
4: Find out how to bypass the security system to make patches
When we do get passed all of this, it will be a bit easier to maneuver to further levels.
Last updated
