[CyberTalents Kids](https://cybertalentskids.com/) is a gamified cyber security platform allowing students especially of the age below 18 to be able to learn , practice , compete and engage in cybersecurity activities based on realistic examples and CTF-like. This goes about how I solved the challenges hosted in each category from this platform, categories available are : Web Security , Malware Reverse Engineering, Cryptography , Digital Forensics, Network security , Open Source Intelligency, Bash, and General Information, but I wont do General Information. ### Malware Reverse Engineering --- ##### Getting Started ``` Description: The correct input is the flag, format flag{xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx} ``` Given a binary file that we have to reverse and get the flag from. I first use the command `rabin2 -z getting-started` ``` ➜ getting-started rabin2 -z getting-started [Strings] nth paddr vaddr len size section type string ―――――――――――――――――――――――――――――――――――――――――――― ``` Nothing important was found, so I now use the `strings` command as `strings getting-started | grep -i "flag"` so as I filter any string with the word flag , unfortunately nothing came up , but looking at plain strings I see this `j}j1j_jljejvjejlj_jojtj_jejmjojcjljejwj{jgjajljf` removing the `"J"` we can atleast get a readable string but reversed: ``` j}j1j_jljejvjejlj_jojtj_jejmjojcjljejwj{jgjajljf }1_level_ot_emoclew{galf ``` So I now just make it to a readable normal string: ``` ➜ getting-started echo "}1_level_ot_emoclew{galf" | rev flag{welcome_to_level_1} ``` FLAG : `flag{welcome_to_level_1}` --- TO BE CONTINUED