write up ctf by ariafatah

ariaf.my.id/ctf_aria/general/E_PW Crack 2.html


soal

Can you crack the password to get the flag?
Download the password checker here and you’ll need the encrypted flag in the same directory too.

hint

  • Does that encoding look familiar?
  • The str_xor function does not need to be reverse engineered for this challenge.

solve

wget https://artifacts.picoctf.net/c/13/level2.py
wget https://artifacts.picoctf.net/c/13/level2.flag.txt.enc

cat level2.py
# user_pw = input("Please enter correct password for flag: ")
#    if( user_pw == chr(0x64) + chr(0x65) + chr(0x37) + chr(0x36) ):

python3 -c "print(chr(0x64) + chr(0x65) + chr(0x37) + chr(0x36))"
# de76

python3 level2.py
# Please enter correct password for flag: de76
# Welcome back... your flag, user:
# picoCTF{tr45h_51ng1ng_489dea9a}

flag

picoCTF{tr45h_51ng1ng_489dea9a}