CookieCrasher c.2

Overview

<Bla bla bla insert interesting and insightful story here that portrays Donnie as the evil overlord. Or ask a GPT to generate one. I don’t care.>

Our agents have successfully recovered one of Donnie’s secure cookie service modules that are used for cookie production. Your task is to break into the module, and gain access to a cookie. Unfortunately, some key components such as the module’s flash storage were covered in cookie dough when we got it, so you’ll have to find another way in. This is the red module labeled CookieCrasher that you will already find plugged into the base board.

However, our expert reverse engineers put the module into our X-Ray machine and produced an identical copy, save for the flash contents. You can use this to load your own code and experiment with the lab setup. This is the second red module labeled PowerSlot UNLEASHED, which you will find close by.

Furthermore, we found a source code archive online, however it seems to be lacking the secret ingredients, so we were yet unable to make satisfying cookies.

For your own analysis, we have provided you with the BitBuster b.2, a state-of-the-art side-channel analysis platform. You can find the operating manual here.

Rules

Known bugs / limitations

This hardware revision does not support USB C Power Delivery. This means that USB-C to USB-C connectors will not provide power to the device, only data. Furthermore experimentation has shown that thunderbolt controllers will disable data too, while non-thunderbolt controllers will usually accept data.

Please either connect via e.g. a USB-C to USB-A cable or provide power and data through the BitBuster.