All Projects → OJ → police-quest

OJ / police-quest

Licence: Apache-2.0 license
Binary exploitation CTF challenge

Programming Languages

Makefile
30231 projects

Police Quest CTF Challenge

This repo contains a CTF challenge written by me (TheColonial). It's a 64-bit Linux binary with a few quirks. I hope you enjoy it. More detail can be found in this blog post.

Rules

In a real CTF, you wouldn't be able to attach to the running Docker container to get access to the internals of the OS. Please don't ruin it for yourselves, and resist the temptation to look inside. It's possible to solve this without the cheating!

Getting the Challenge

Clone this repo: git clone https://github.com/OJ/police-quest

The Goal

Read the flag from the target.

The Binary

The target binary is police_quest, it's in the root of this repo. Static and dynamic analysis should be done on this binary, as it's the one that runs inside the target docker container.

Running

Run the challenge in the Docker container by running make (works on Linux and OSX). If you're on Windows, just run docker-compose up and you should be good to go. From there you can talk to the binary by:

$ nc localhost 10100

Don't use telnet, it messes with line endings. Have at it!

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].