reverseProeasy
task2.out
spbctf
Task: 32-bit ELF binary accepts two letters as arguments, applies affine cipher transformation to encoded string. Solution: Brute force 29x29 key combinations to find k1=7 ('h'), k2=13 ('n') that decodes to flag.
$ ls tags/ techniques/
static_analysismodular_arithmeticaffine_cipher_bruteforcepython_reimplementation
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [reverse][Pro]task1.out (re2)— rev-kids20.forkbomb.ru
- [reverse][Pro]Basic— spbctf
- [reverse][Pro]s2.out— rev-kids20.forkbomb.ru
- [reverse][Pro]mixer— rev-kids20.forkbomb.ru
- [reverse][Pro]Signalization Two— spbctf