Challenge ID: 5ab77f5f33c5d40ad448c807
Initial run
Launching the executable produced a welcome prompt but ignored any keyboard input.
Process inspection
With Sysinternals Process Explorer I discovered a listening socket on TCP 31279 and several interesting string references.
Triggering the program
Sending a plain HTTP request to http://127.0.0.1:31279/ caused new output to appear in the console window.
Loading the binary
The executable was opened in Binary Ninja.
String & symbol reconnaissance
WSAStartup, socket, bind, etc.).Control-flow graph analysis
Focusing on the function that prints the welcome message, I annotated each call:
WSAStartup – initializes Winsock.
Microsoft docs: https://learn.microsoft.com/en-us/windows/win32/api/winsock/nf-winsock-wsastartup
htons(0x7A4F) – converts 0x7A4F to network byte-order, confirming the listener uses port 31279.
Linear High Level IL
The decompiler clarified the high-level logic:
Send a single packet e.g., curl http://127.0.0.1:31279/ to satisfy the win condition.
No specific payload or key is required; any data triggers the win message.
Call Stack
Graph