therepanic on 2026-03-05 16:40:
[Click to reveal]CTF{My_S3cr3t_Fl4g}W0WY0uF0undM3{0r N0t}
SirWardrake on 2026-03-12 01:38:
[Click to reveal]CTF{My_S3cr3t_Fl4g}W0WY0uF0undM3{0r N0t}
At first glance, it looked complicated. But it isn't ;-)
segfaults on 2026-03-15 10:57:
[Click to reveal]CTF{My_S3cr3t_Fl4g}W0WY0uF0undM3{0r N0t}
segfaults on 2026-03-15 10:57:
[Click to reveal] CTF{My_S3cr3t_Fl4g}W0WY0uF0undM3{0r N0t}
Sanemy on 2026-03-18 18:43:
CTF{My_S3cr3t_Fl4g}W0WY0uF0undM3{0r N0t}
db on 2026-03-21 05:43:
[Click to reveal]strings got me the flag, CTF{r3t_Fl4g}W0WF0und{0rN0t}
Picolo on 2026-04-03 17:50:
[Click to reveal]You can use ltrace tool {apt install ltrace} to capture the flag
as you can run the command :ltrace ./crackit "random thing"
and if you focus on the output ,you'll see what forms the flag ,you slowly link and collect them in a text editor ,and the final result would be CTF{My_S3cr3t_Fl4g}W0WY0uF0undM3{0r N0t} ,dont forget to put the flag between "" before you check if its correct
pepino on 2026-04-04 01:40:
[Click to reveal]CTF{My_S3cr3t_Fl4g}W0WY0uF0undM3{0r N0t}
pretty easy, as it was supposed to be