1ecc7dd7b9763028e119e5046268d922 - Open binary file in decompiler and locate
v4 = (void **)Buf2;
Open up Buf2 and get the password. |
==> |
Nice challenge, indeed the strcmp is to distract the players from the real flag |
==> |
Imagine trying to debug :(
I am kinda lost in the sea of method invocation |
==> |
I gotten a0a0a0a too while trying to break the bitwise and
(v1 & 1) != 0. Overall a fun reversing key gen challenge. |
==> |
Can be deciphered using python script, statically analyzing the binary for the encoded key and reversing it using a for loop. |
==> |
// Key Gen Idea
1) Randomly generate a string (Try to do it between 'A' and 'Z'
2) Create a key variable "key" to store the generated key
3) for each character c in the generated string: add c ^ 4 + len(generated string) to key.
4) Send in the generated string as User and key as Serial.
----
Some user and keys generated:
User: VPACHMPVVV
Serial: \^OQVS^\\\
User: BPUEYDTDME
Serial: P^[KgJZJSK
User: ISMHNJPSHN
Serial: WaSVTX^aVT |
==> |