BackdoorCTF 2016 - isolve - Akash Trehan

BackdoorCTF 2016 - isolve

Backdoor Logo

BackdoorCTF is the annual flagship CTF competition conducted by SDSLabs and InfoSecIITR.

Points: 200


nc 7070


The task was pretty obvious: the server provides us with a regular expression and we need to supply a string which can be matched by this regex. The tricky part was finding a way to generate strings satisfying the regex since there was a time limit after which the server closes the connection. After some googling I found this amazing project to generate the strings.

So I simply wrote a short parser for the communication with server, and use exrex to get answers. But there was some problem with exrex code. It generated \n for non-alphanumeric characters(which is actually correct). The server didn’t behave well to this since it was obviously expecting newline at the end of the input. So I modified my script to tackle this. There were also issues with \S and \w which I replaced by hardcoded characters.

import re
import socket
from time import sleep
import exrex

def main():
    s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    s.connect(("", 7070))
    regex = "Your regex:\n(.*)\n"
    initial_data = str(s.recv(4096))
    while True:
        sleep(1) # The server has a sleep time of 1 second before sending the regex
        task = str(s.recv(4096))
        m =, task)
        print("regex: "
        i ="\W", "@").replace("\w", "a").replace("\s", " ").replace("\S", "a") # Corrrections for using `exrex`
        print("Final regex" + i)
        result = exrex.getone(i)
        print("string: "+result)
        s.sendall(str(result) + "\n")


This gave me this :) :


followed by the flag of the form

Follow @CodeMaxx
BackdoorCTF 2016 - jigsaw
Akash Trehan

Akash Trehan


comments powered by Disqus
rss facebook twitter github youtube mail spotify instagram linkedin google pinterest medium