NM01 - 250pts
Briefing
Retrieve output from network endpoint at
cfta-nm01.allyourbases.co
port8017
and figure out how to get the flag.
Solution
Let's connect to the service using
netcat
and see what we're dealing with:It seems to output some hexadecimal. Let's try again and input the ascii representation:
Okay, we need to do it faster. So, let's write a script that connects, converts the hexadecimal to ascii, submits the ascii representation, and then hopefully get the flag.
script.py uses pwntools to do just that. Running the script produces the following output:
Flag
o[hex]=>i[ascii]=:)
Last updated