Agent apok…I don’t know how you did it, but good work! Your decryption helped us to see that the file was a registry installation file. It was used to place an executable file into our start up, so all the time since the break in this mystery program has been running. We had a brief […]
You are browsing archives for
Categoría: Reversing
Mod-X Central Command Levels 2 and 3 [solutions]
Level 2 Continuing with the game this time we get this: Agent apok… Good Work on your previous mission – you are ready for your next mission. We now have access to the terminals. We think the intruder is telling the truth – other changes have been made to the system. A file has been […]
FwhibbitCTF 2017 – Bomb
Category: Reversing. Points: 450. We need an 8 digits code to disable the bomb. That code is used to operate with two arrays of bytes. Any mistake will make the bomb to explode.
1 2 3 4 5 |
#first array of bytes aof = [0xF7, 0xFC, 0xB5, 0x83, 0x81, 0xA7, 0x83, 0x89, 0xBD, 0xFD, 0xBF, 0x9E, 0xFA, 0xA6, 0x9A, 0xF4, 0x84, 0xA2] #second array of bytes aof2 = [0xBB, 0xA8, 0xEA, 0x84, 0xD7, 0xCA, 0x80, 0x80, 0xEE, 0xA9, 0xB9, 0xDB, 0x91, 0xF0, 0x9D, 0xFB, 0x81, 0xE2, 0xF7, 0xFD, 0xE4, 0x80, 0x86, 0xF1, 0xCC, 0xC5, 0xE5, 0xA9, 0xEF, 0xC0, 0xA6, 0xE3, 0xC8] |
My solution is below: The code is 8 digits long, every digit goes from 0 to 9, that code is used to operate with […]
FwhibbitCTF – Crazy serial
Last week, I played the FwhibbitCTF for a few hours, it was a CTF organized by Follow The White Rabbit. They used the Facebook platform, and this challenge is the corresponding to Congo country. My solution for Crazy serial is below . Category: Reversing. Points: 330pts. When I opened this challenge… As it can be seen, […]
AlexCTF – catalyst system
Thanks AlexCTF for challenges!