miscProhard
TeXyC
ASIS CTF
Task: recover a flag hashed by a custom LFSR-based algorithm embedded in a pdfTeX document. Solution: extract the TeX source and hash values from the PDF, reverse-engineer the LFSR hash with shifted hex encoding (MOP/MEP), then brute-force each 4-character chunk in parallel.
$ ls tags/ techniques/
PDF content extraction with pdftotextTeX source code reverse engineeringLFSR-based hash algorithm analysisParallel brute-force with multiprocessing
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [reverse][Pro]Nava - ASIS CTF Reverse Challenge— ASIS CTF
- [forensics][Pro]100 Pages— taipanbyte
- [reverse][Pro]Cursed Steganography— duckerz
- [stego][Pro]Message from a Stranger— hackerlab
- [crypto][Pro]Composite— taipanbyte