networkProhard
First Nightmare
grodno_new_year_2026
Task: Custom TCP protocol challenge requiring a payload with MD5 hash computed from the TCP sequence number. Solution: Used Scapy raw sockets with a random ISN (not zero) to perform the TCP handshake, computed md5(str(seq) + "get_flag") for the data packet payload, and blocked kernel RST packets via iptables in Docker.
$ ls tags/ techniques/
raw_socket_tcpisn_randomizationtcp_handshakepayload_construction
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [crypto][Pro]Firewall— uoftctf2026
- [forensics][Pro]exFill— grodno_new_year_2026
- [crypto][Pro]RSA?— grodno_new_year_2026
- [misc][Pro]unbefleckte_empfangnis— hxp_39c3
- [crypto][Pro]ChristmasRSA— grodno_new_year_2026