htpp-server

Initial Binary Inspection

· Examined the server.unknown file using basic analysis tools

· Identified it as an x86-64 ELF executable web server

· Found string references to socket operations and HTTP functionality

Finding Important Strings

We located these critical strings in the binary:

· GET /goodshit/umcs_serverHTTP/13.37

· r/flag

· /flag

· Messages about socket creation and client connections

Understanding the Server Logic

· The server expects a specific HTTP request format

· It uses a non-standard HTTP version (13.37)

· When it receives the correct request, it attempts to read a file called "/flag"

Creating the Attack

I created a simple HTTP request using netcat: nc 34.133.69.112 8080

GET /goodshit/umcs_server HTTP/13.37

Host: 34.133.69.112

r/flag

Getting the Flag

· Sent the crafted request to the server

· The server processed the special request format

· It read and returned the flag content

Flag: umcs{http_server_a058712ff1da79c9bbf211907c65a5cd}

Last updated