Pwn:
Recall(Windows,Pwn) [1 solves]
The target is a Windows service running on the host `recall.insomnihack.ch`.
The following assets are provided to help you solve this challenge.
1. The service's executable: [service.exe](<https://static.insomnihack.ch/media/Service-3725c44a2ce135fb3883180b84074bff0e779a1fa8af463fa37c56c5559e9d2a.exe>)
2. The public debug symbols: [service.pdb](<https://static.insomnihack.ch/media/Service-ff6e4b40201fc2b7e3e73739daf8d9c3a5f649be6dbcdb047bcf0d12ead70b8b.pdb>)
3. A sample C/C++ file containing the code for connecting to the remote service: [bootstrap.cpp](<https://static.insomnihack.ch/media/bootstrap-756e365ee67c96f2d278aa41be03d1bef534abaffb993c72b95a21a8ecf98214.cpp>)
4. User credentials: `winternals:Insomni'h4ck`
5. Path of the flag on the remote server: `C:\\Program Files\\Winternals6\\flag.txt`
(Callbacks are allowed from the target server to your machine.)
recall.zip
codebreaker: [25 solves]
Will you be able to break the code?
flag.txt: in the same directory
[codebreaker.bin](<https://static.insomnihack.ch/media/codebreaker-28d72946604072a16b5e7194286073dc15653dc9c97b72e6e6a12fefbe0f2902.bin>)
[Dockerfile](<https://static.insomnihack.ch/media/Dockerfile-174a90a6e5276ef23519c70a02796823277a56512ced638633b9e9110d69d499.tar.gz>)
nc codebreaker.insomnihack.ch 6666
codebreaker.zip
smartmeter(IOT,Pwn,Reverse): [11 solves]
Can you outsmart our smartmeter?
nc smartmeter.insomnihack.ch 1337
smartmeter.tar
proto-backdoor: [6 solves]
One of our sysadmins got caught in the datacenter trying to upload some binary to one of our servers using a USB drive. We confiscated it and it seems to contain some binary.
We can't get access to their laptop but some service is listening on port 45678. Can you help us get their flag ?
Flag is in `flag.txt`.
nc proto-backdoor.insomnihack.ch 45678
[proto-backdoor](<https://static.insomnihack.ch/media/proto-backdoor-cd8626de2e22a0010be9e0b81683943c2b8e00e4b5cc3c3ba4f307dcbf7f6cb0>)
proto-backdoor.zip
Web:
Unchained(warmup): [55 solves]