cryptoProhard
CryBaby
grodno_new_year_2026
Task: Flag split into two 14-byte halves, XORed together, then encoded through 1-20 random layers of base64/hex encoding. Solution: Iteratively detected and peeled encoding layers (18 total), then used known flag format "grodnogrodno{" and closing "}" as known plaintext to recover both halves via XOR properties.
$ ls tags/ techniques/
flag_format_exploitationencoding_detectionlayer_peelingxor_known_plaintext
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [reverse][Pro]Happy New Year— grodno_new_year_2026
- [crypto][free]xorxorxor— hackthebox
- [crypto][Pro]babyCrypto— grsu
- [crypto][Pro]Enigma— hackerlab
- [reverse][Pro]Baby (Obfuscated) Flag Checker— uoftctf2026