[CyberTalents Kids](https://cybertalentskids.com/) is a gamified cyber security platform allowing students especially of the age below 18 to be able to learn , practice , compete and engage in cybersecurity activities based on realistic examples and CTF-like.
This goes about how I solved the challenges hosted in each category from this platform, categories available are : Web Security , Malware Reverse Engineering, Cryptography , Digital Forensics, Network security , Open Source Intelligency, Bash, and General Information, but I wont do General Information.
### Malware Reverse Engineering
---
##### Getting Started
```
Description:
The correct input is the flag, format flag{xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx}
```
Given a binary file that we have to reverse and get the flag from.
I first use the command `rabin2 -z getting-started`
```
➜ getting-started rabin2 -z getting-started
[Strings]
nth paddr vaddr len size section type string
――――――――――――――――――――――――――――――――――――――――――――
```
Nothing important was found, so I now use the `strings` command as `strings getting-started | grep -i "flag"` so as I filter any string with the word flag , unfortunately nothing came up , but looking at plain strings I see this `j}j1j_jljejvjejlj_jojtj_jejmjojcjljejwj{jgjajljf`
removing the `"J"` we can atleast get a readable string but reversed:
```
j}j1j_jljejvjejlj_jojtj_jejmjojcjljejwj{jgjajljf
}1_level_ot_emoclew{galf
```
So I now just make it to a readable normal string:
```
➜ getting-started echo "}1_level_ot_emoclew{galf" | rev
flag{welcome_to_level_1}
```
FLAG : `flag{welcome_to_level_1}`
---
TO BE CONTINUED