reverseProeasy

task2.out

spbctf

Task: 32-bit ELF binary accepts two letters as arguments, applies affine cipher transformation to encoded string. Solution: Brute force 29x29 key combinations to find k1=7 ('h'), k2=13 ('n') that decodes to flag.

$ ls tags/ techniques/
static_analysismodular_arithmeticaffine_cipher_bruteforcepython_reimplementation

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups

  • [reverse][Pro]task1.out (re2)— rev-kids20.forkbomb.ru
  • [reverse][Pro]Basic— spbctf
  • [reverse][Pro]s2.out— rev-kids20.forkbomb.ru
  • [reverse][Pro]mixer— rev-kids20.forkbomb.ru
  • [reverse][Pro]Signalization Two— spbctf