Description
Find the Flag!!
Continue reading [Sharif University CTF 2016] [Reverse 100 – Android App] Write Up
Find the Flag!!
Continue reading [Sharif University CTF 2016] [Reverse 100 – Android App] Write Up
Run and capture the flag!
file: serial: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.26, BuildID[sha1]=77e92e8b1bd4f26641bab4dbf563037a7b9538d2, not stripped
Continue reading [Sharif University CTF 2016] [Reverse 150 – Serial] Write Up
The flag is : The valid serial number
file: RM.exe: PE32 executable (GUI) Intel 80386, for MS Windows
Continue reading [Sharif University CTF 2016] [Reverse 50 – SRM] Write Up
Flag is : The valid input
The file is a: dMd: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.24, BuildID[sha1]=2643fecd383362fe9593ef8605a9ce882a85a38a, not stripped
Continue reading [Sharif University CTF 2016] [Reverse 50 – dMd] Write Up
I’ve forgotten my flag. I remember it has the format “9447{}”, but what could it be?
Unfortunately the program no longer just prints the flag.
flagFinderRedux
Continue reading [9447 CTF 2015] [Reverse 70 – The *real* flag finder] Write Up