REbase
Last updated
Was this helpful?
Last updated
Was this helpful?
Binary RE, 400 points
You receive an ELF binary which you must unlock with a key. Find the key and it will contain your flag.
So I read writeups about solving the challenge the "correct" way and I wanted to share my own solution which does not require any reverse engineering.
We are given a 64-bit ELF . Let's see what's up with it:
So the binary asks for a flag in argument, and outputs
the length of the flag we provided
some kind of encrypted version of the flag we provided
something that is probably the encrypted version of the actual flag.
We can also notice starting our input with MCA{
makes the first characters of the two ciphers match up. Also, it looks like base64 but
I am not entirely sure about my script because the farthest it goes only yields this portion of the flag: MCA{Th15_wUz_EaZy_Pe@Zy_L3m0n_SqU33z
. We can easily deduce the true flag from there, though.
Enjoy!
With some groping around, we can find the password without actually reverse engineering the binary. It is just a bit long to do it manually (but still totally doable). I wrote a script to automatize the process ().