| BabyRev |
Nice ctf.
I did a post-root.
#include <stdio.h>
#include <stdint.h>
int main(void) {
/* Found in ghidra */
uint8_t enc[] = {
0x2a, 0x3e, 0x2d, 0x00, 0x08, 0x0f, 0x1d, 0x1e,
0x0a, 0x25, 0x47, 0x07, 0x2a, 0x47, 0x23, 0x27,
0x2d, 0x12, 0x4f, 0x28, 0x22, 0x36, 0x4b,
0xf2, 0xe5, 0xbd, 0xfe
};
for (int i = 0; i < sizeof(enc); i++) {
putchar(enc[i] ^ (i + 105));
}
putchar('\n');
return 0;
}
No need to type the password nor the code.
I did this after typing the password and the code tho... |
2026-01-05 06:55 |
| BabyRev |
CTFlearn{W4s_1T_Th4T_H4rd?} |
2026-01-05 05:53 |
| XORcist |
Funny aah challenge like gng ts pmo sybau |
2026-01-05 00:14 |
| MyCrackme |
You can make a python script that goes through all possible passwords for this binary.
while read -r line; do if echo "$line" | ./frame >/dev/null; then echo "[+] $line"; fi; done <<< "$(python3 decode.py)" |
2026-01-04 06:44 |