/home/htorquato

Assortment of random things I work on

Hack The Box CTF 2025: Tales from Eldoria - Pwn - Quack Quack

Posted on: 22 Mar 2025

Category Name Difficulty Status
Pwn Quack Quack Very Easy Not Completed ❌

On the quest to reclaim the Dragon’s Heart, the wicked Lord Malakar has cursed the villagers, turning them into ducks! Join Sir Alaric in finding a way to defeat them without causing harm. Quack Quack, it’s time to face the Duck!


The target here is a quack_quack binary file. When invoking it, it prints out the picture of a duck, and expects you to quack it.

Mr. Quack Quack

But it seems like it needs a proper greeting.

Mr. Quack Quack - Angry

Attempting to print out the contents of the binary with cat shows some interesting things:

cat result

It seems that there is a conversation programmed.

I then attempted to run the extract the binary strings using the strings utility, but didn’t get anything important back.

I then uploaded the binary to a online decompiler to see how effective it would be, it looks like the names were not stripped during compiling:

Online decompiler

So I fired up Ghidra and started decompiling the code.

Looks like main calls the duckling function, that not only prints out the majestic duck, it also handles the conversation.

There I could see that it expected what I think is a name prefixed with “Quack Quack “ as a greeting:

duckling function

And with that, I was able to get him talking. But, looking at the code, it doesn’t really matter what I say to him, he’ll always win.

There is a duck_attack method that is responsible for reading and displaying the target flag:

duck_attack function

At this point, I decided to run the target machine to see what are the limitations on executing the exploit, since one of the solution I thought for this was the debug the executable and force call the duck_attack function call.

It was a little complicated and weird since it gave me a IP/port. But I found this post on Medium by Rahul Hoysala that explained how to go through with accessing the challenge.

from pwn import *

r = remote('83.136.251.145', 43092)
r.stream()

r.sendline(b'Quack Quack test')

Failing at it

I could see that I needed to do an buffer overflow with the input to force calling the duck_attack method. But due to my inexperience with such attacks, I decided to move on to other challenges to not spend the next couple of days learning about this.