it seems when I just debug the file and enter any password it drops the Unpacked.exe which is easy to REV |
==> |
I don't know what really happened but after I get disappointed and closed the x32dbg suddenly find Unpacked.exe and it was an easy xor and find the password.
s1 = b"E2*2{0\"z"
flag = ""
for i in s1:
flag += chr(i ^ s1[0])
print(flag)
flag = ""
for i in s2:
flag += chr(i ^ s2[0])
print(flag) |
==> |
really awesome challenge
from pwn import xor
ct = "822="
val = 0x53
print(xor(ct, val)) |
==> |
how do you guys know that the hash algorithm is Fowler–Noll–Vo? |
==> |