Skip to main content

1. Asman

Challenge Overview

Welcome to "The Mighty ASMan" challenge! In this exciting assembly programming challenge, you will write x86-64 assembly code that produces specific integer outputs across multiple rounds. The challenge is designed not only to test your understanding of assembly language but also to familiarize you with the pwntools library, which is essential for exploit practices.

Objective

Your main goal is to obtain flag.txt from a remote server by crafting assembly code that produces specified integer outputs across a series of rounds with evolving constraints. You will use pwntools to communicate with the server or binary, sending your payload and receiving data in response. Successfully completing 20 rounds, each presenting new challenges, is essential. Your code will be compiled and executed, with correct outputs advancing you to the next round.

Downlaod

You can download the challenge from our CTF server. (http://kayle.snu.ac.kr:10000/)

Due date

Submission

Once you've obtained the flag, please submit it to our CTF server. Then, submit both your exploit code and a 1-page report through ETL. Your report should briefly explain the code you used to get the flag and how you solved the challenge. Please do not cheat, share your flag, or disclose your solutions. Ensure that your report is strictly limited to 1 page.

Before submitting, use this command to compress your files: zip report.zip solve.py report.pdf. Make sure to rename your exploit code to solve.py and your report to report.pdf before running this command. Finally, submit report.zip through ETL.