htpp-server
Initial Binary Inspection
· Examined the server.unknown file using basic analysis tools
· Identified it as an x86-64 ELF executable web server
· Found string references to socket operations and HTTP functionality
Finding Important Strings

We located these critical strings in the binary:
· GET /goodshit/umcs_serverHTTP/13.37
· r/flag
· /flag
· Messages about socket creation and client connections
Understanding the Server Logic
· The server expects a specific HTTP request format
· It uses a non-standard HTTP version (13.37)
· When it receives the correct request, it attempts to read a file called "/flag"
Creating the Attack
I created a simple HTTP request using netcat: nc 34.133.69.112 8080
GET /goodshit/umcs_server HTTP/13.37
Host: 34.133.69.112
r/flag
Getting the Flag
· Sent the crafted request to the server
· The server processed the special request format
· It read and returned the flag content
Flag: umcs{http_server_a058712ff1da79c9bbf211907c65a5cd}
Last updated