Information Security Lab 3 | Bomb Lab

Series: Information Security Lab

Information Security Lab 3 | Bomb Lab

<somthing may be wrong with the picture>

If you are not a registered student, you can simply skip this section because the resource in this part will be private. If you are a registered student, follow the steps before taking the first lab assignment.

  • Step 1. Register your account and receive an api-key here (note that this address changes every year and you need to go to the official website to get the latest one).
  • Step 2. Log in with your api-key in the email.
  • Step 3. ssh connect to the server for a particular lab with the information provided on the submission site.
[host] $ ssh lab01@ctf_server_address -p ****
[host] Password: lab01
  • Step 4. Check the README file for instructions.
[CTF server] $ cat README
  • Step 5. Run the bomb binary. You will need to enter your api-key.
[CTF server] $ ./bomb
Enter your api-key: ...
...
> password
  • Step 6. We should not guess the answers. Before we type in the password, we have to make sure that we really know what’s going on. When you run the bomb binary, you should simply find the answer and the answer consists of 10 phases. Whenever we successfully pass a phase, we will get a flag, otherwise, the bomb will just explode.
  • Step 7. Once we get the flag, go to the submission website and submit the flag under the corresponding problem set. Make sure the flag you submit is the official copy of the bomb program. In order to generate the correct flag, we need to run the bomb program from the corresponding /home/lab* directory. For example, the bomb program in the first lab should be the one in,
[CTF server] $ cd /home/lab01