| Ragnarok |
Name: G3orge
Password: FDC99E0E207566E4-6CB65399DF11981A-70C605B158C8DA78-197D2740C696580B
This was a decently fun challenge, if I have one minor complaint it's that the challenge description described the VM as stack based, while in reality it makes heavy use of virtual registers. Not a huge deal, but it did throw me off a bit at first since I was expecting a traditional stack VM.
I did really like all of the flavor text though, it made things quite fun. And while simple the VM and algorithms was fun to reverse and reimplement.
Here is a link to a Python based keygen:
https://pastebin.com/vB6927zn
It's a stripped down version as I originally lifted the entire VM, not really needed but it was fun. |
2026-01-27 04:40 |
| EasyVM |
@CorpCons Yeah it was fun. I like dealing with VMs and creating keygens are always fun. It was a good challenge. |
2026-01-26 21:20 |
| X-0-R |
Key: CTFLearn{y0u_x0r3d_th3_c0d3}
I'd personally rate this a 1 in terms of difficulty. Solving a constant XOR when you have a plaintext and XORd copy is about as basic as it comes when it comes to XOR.
I suppose this could be a good introduction for XOR for people with no knowledge of it though. |
2026-01-26 21:18 |
| EasyVM |
EASYAB0KGS
VMGHEG1YCT
CRACKOLYKT
It was my first time dealing with such a VM so it took me a bit off time, but I did figure out the algorithm eventually. |
2026-01-26 09:28 |