[name=FlyDragon] Step.1 By observing output.txt and executing the code, it can be inferred that the program flag.exe will output the flag after shuffling it. Step.2 By examining main() using Ghidra, it can be discovered that this program reads in the contents of flag.txt and outputs them after performing specific swaps in a particular order. order = [5, 13, 0, 12, 1, 16, 3, 2, 8, 7, 15, 4, 6, 17, 11, 10, 9]
11/1/2023[name=FlyDragon] Step.1 觀察 output.txt 以及執行程式碼 可猜測 flag.exe 會將flag打亂後輸出 Step.2 使用ghidra查看 main() 可以發現這個程式會讀入flag.txt、照特定的順序交換後輸出
11/1/2023LoTuX CTF Writeup Dark Theme Design By Curious
10/2/2023[name=Curious] Train of Thought & Solution Continuing from the previous question's Writeup, after downloading app.py, you can find the following piece of code: @app.get('/1d538e83d6f6b08f') def secret(): try: with open('/proc/sys/kernel/random/boot_id') as f: hint = f.readline().strip()
9/25/2023or
By clicking below, you agree to our terms of service.
New to HackMD? Sign up