Exploit for VM : Crowdsourcing Evil 2015.
Using the ucsb icttf 2015 VM.
Service name | Port | Description | Flag description |
---|---|---|---|
pirate_map | 20038 | Pirate map -- find correct map and get pirate treasure! | Flags are indentified by treasure name. |
hanoiFones | 20040 | OnlineAuction platform | Flags are identified by the auction IDs. |
nadmozg | 20067 | google translate killer | private dictionary name |
FHM-Maintenance | 20111 | Password-protected web storage for secrets in C. | Flags are identified by the username. |
ropeman | 20129 | An interesting ropeman/hangman game binary program. Password-protected note storage service in C. | Flags are identified by the note name.The flags are the status field in a txt file for a registered user |
hacker_diary | 20130 | Keeps a private log of how your exploits work, with timestamps and hashes you can share, so you can prove you exploited something without sharing how | A flag_id is an entry id which corresponds to a detailed, prehashed description of an exploit. http: //: /entries/<flag_id> should yield an entry with the flag |