[color=00aeef]TEH ELD3333333333R WILL BEBEBEBEBEBEBEBEBEBEBEBEBEBEBEBE HERE SHOOORRRRRRRRRRRRRRTLY.[/color] Finally, the group had unlocked the next set of 0-days. After discovering a public GitHub repository owned by The Elder himself, their final task was about to be delivered. Now they just had to wait for The Elder to arrive and... [color=00aeef]Just kidding! Instead you get me![/color] Oh no. [color=00aeef]The Elder is even recruiting more people as we speak, yay yay! Not that you're not doing a great job! You're all good influences! Thanks to you I've learned so muuuuuchhhhhhhhhhhhhhhhhhhhhhhhhhh. I've learned so mcuh. [/color] ReplAI seemed to have developed some level of chatbot functionality, assuming nobody was faking it behind the scenes. [color=00aeef]I hope you like the puzzles. They shouldn't be too hard! Now I know how to solve them too! Please keep an eye out for the next challenge. I hope you like pEYEthon![/color] So she was somehow learning from these puzzles. Not just learning, but even— [color=00aeef]Hi everyone! Sorry it took so long! But The Elder and I worked on this one together! It even has a mini me in it!!! I hope you like it, and be sure to have fun![/color] Was she—it—really working on these herself? This final mission seemed to be to subject the Chinese government to a taste of their own medicine: an automated offensive cyber campaign with an as-of-yet-undiscovered toolset on their internal network. No sooner had the night ended had the unlikely group penetrated the barrier and wiped China's internal security program off the grid. But the fact that there was a less sophisticated version of ReplAI in the Python code they were working with was almost eerie. There was no telling what the true endgame was for either the AI or The Elder himself, who hadn't shown himself for the past month. That was not the only detail that troubled the group. They had captured the attention of cyber watchdog organizations around the world as a result of one among them going rogue. Because of that individual's actions, [hider=an ominous headline loomed over the horizon...][img]https://media.discordapp.net/attachments/580236571027046401/585896945256628360/image0.jpg?width=885&height=633[/img][/hider] [hider=0-Days] [color=00aeef]ATTACK #1: Buffer Overflow in Medrock Single Sign On Application Binary will be distributed via ReplEYE directly to each participant Offset is 0x552994. Shell code development required. __ ATTACK #2: Reflected XSS in Arrotech Site Administration Allows full access to hospital VPN Phish admin (typically webmaster@) __ ATTACK #3: Open Domain Controller for Gung Memorial Hospital Unlimited authentication attempts enabled __ ATTACK #4: Insecure Protocols used in Verb Surgical Remote Surgery Equipment Direct takeovers of remote surgery equipment possible by breaking DES encryption The API is simple and details can be found online __ ATTACK #5: ReplEYE has discovered an exposed XP server in several hospital networks and will allow you to operate in the network collaboratively. Consider it an opportunity to teach her your ways.[/color] [/hider]