Challenges

pyEvaluator

Authorawe
CategoryMisc
TagsReversing  Python  Jail 
Points19
DateTue 03 September 2013
StateUp
StatusNot Solved
Solvers 106
Votes9.34 (71 votes)
Description
The pyEvaluator authors implemented several classical techniques to counter reverse engineering (compilation of python sources to .pyc files, source code obfuscation...), and also to prevent the exploitation of vulnerabilities. But that's not an issue for you, right?
 
The application is launched with xinetd and is available in TCP at the address pyevaluator.hax.w3challs.com:42007.
 
Your goal is to find and read the flag.
You'll have to find out how to spawn a shell.
 
Flag
Solvers
Login


No account yet? Register.
Last challenges
Last forum posts