Reverse Engineering
Last updated
Was this helpful?
Last updated
Was this helpful?
Description
I wonder what this really is...
''.join([chr((ord(flag[i]) << 8) + ord(flag[i + 1])) for i in range(0, len(flag), 2)])
Solution
a
Flag:
Description
Solution
a
Flag:
Description
Solution
So opening up the code I noticed that their are two functions, but when ran only 1 is called. I added only 1 line of code that would print out the flag.
Flag: picoCTF{1|\/|_4_p34||ut_8c551048}
Description
Solution
a
Flag:
Description
There is something on my shop network running at
nc mercury.picoctf.net 28067
, but I can't tell what it is. Can you?
Solution
a
Flag:
Description
Solution
a
Flag:
Description
Solution
a
Flag:
Description
Solution
a
Flag:
Description
Solution
a
Flag:
Description
Solution
a
Flag:
Description
Solution
a
Flag:
Description
Solution
a
Flag:
Description
Solution
a
Flag:
Description
Solution
a
Flag:
Description
Solution
a
Flag:
Description
Solution
a
Flag:
Description
Solution
a
Flag:
What integer does this program print with arguments 4004594377
and 4110761777
? File: Flag format: picoCTF{XXXXXXXX} -> (hex, lowercase, no 0x, and 32 bits. ex. 5614267 would be picoCTF{0055aabb})
Best Stuff - Cheap Stuff, Buy Buy Buy... Store Instance: . The shop is open for business at nc mercury.picoctf.net 3952
.
For what argument does this program print `win` with variables 83
, 0
and 3
? File: Flag format: picoCTF{XXXXXXXX} -> (hex, lowercase, no 0x, and 32 bits. ex. 5614267 would be picoCTF{0055aabb})
What integer does this program print with argument 3297082261
? File: Flag format: picoCTF{XXXXXXXX} -> (hex, lowercase, no 0x, and 32 bits. ex. 5614267 would be picoCTF{0055aabb})
Hmmm this is a weird file... . There is a instance of the service running at mercury.picoctf.net:34256
.
What integer does this program print with argument 4012702611
? File: Flag format: picoCTF{XXXXXXXX} -> (hex, lowercase, no 0x, and 32 bits. ex. 5614267 would be picoCTF{0055aabb})
Can you tell what this file is reading?
The flag has got to be checked somewhere... File:
What integer does this program print with argument 3459413018
? File: Flag format: picoCTF{XXXXXXXX} -> (hex, lowercase, no 0x, and 32 bits. ex. 5614267 would be picoCTF{0055aabb})
It's not a bad idea to learn to read Powershell. We give you the output, but do you think you can find the input?
I don't trust password checkers made by other people, so I wrote my own. It doesn't even need to store the password! If you can crack it I'll give you a flag. nc mercury.picoctf.net 47110
What is the password? File: Flag format: picoCTF{...}