I've finally completed the "Secure Chat 3" challenge from pwn.college's Integrated Security module, working towards my Orange belt.
Some thoughts:
. So many attack vectors - hard to find a way where to start!
. Hint: If you find yourself writing a pure scapy MITM-proxy (including IP, TCP, HTTP, application layer), you are somewhat on the wrong track
