Press "Enter" to skip to content

Tag: Reverse

[CSAW2017] – tablEZ

Solution The first step is to decompile the given binary. Main

  Main_asm

get_tbl_entry

byte_201281

After have some analysis we know: 1. The program will based on the input to perform table lookup 2. The table format are 00 xx 01 xx 02 xx 03 xx 3. The main encrypt function are get_tbl_entry So, based on this information, we can write the code to get the flag.

Output: flag{t4ble_l00kups_ar3_b3tter_f0r_m3}

Leave a Comment

[Bugs Bunny] rev100 – 100pt

Solution: Key point:

c = a xor b , maybe c is the flag?

Bugs_Bunny{X0r_1s_fun}

Leave a Comment

[Bugs Bunny] mysterious ! – 75pts

Solution: We guess all of these value are base64 string. So our plan is extract it out and decode it. Base64 Data:

Finally we get Bugs_Bunny{Th1s_t0t4lly_Th3_fl4g}

Leave a Comment