Rating:

## Analyze
- File **server.py**: give key match md5 hash code to up ELF file. Run file ELF with custom lib (**scf.so**).
- File **scf.so**: Custom lib which filter some syscall. Hook into `_libc_start_main` func.

## Bypass
- Brute force key.
- Write a `execve('/bin/sh', ...)` shellcode and compile it with elf format. Then patch binary: jump from EP to `main`. (file **ezsandbox**).

Original writeup (https://github.com/Hi-Im-darkness/CTF/tree/master/bctf2018/misc/ezsandbox).