Home CTFs | 404CTF_2024 | Retro | Intronisation du CHAUSSURE
Post
Cancel

CTFs | 404CTF_2024 | Retro | Intronisation du CHAUSSURE

Intronisation du CHAUSSURE

[intro_enonce.png]

The binary is available here. In the main function we see the following code:

[intro_main.png]

We notice the password split character by character and the order is the order of variable creation. I wrote the following python code:

1
2
3
4
5
6
arr = {"local_27": 't', "local_21": 'r', "local_1e": '1', "local_1d": 's', "local_23": 'n',"local_24": '1', "local_26": 'u', "local_28": '5', "local_1f": 'n', "local_1c": '3',"local_20": '0', "local_25": 'p', "local_22": 't'
}
passwd =""
for val in ["local_28", "local_27", "local_26", "local_25", "local_24", "local_23", "local_22", "local_21", "local_20", "local_1f", "local_1e", "local_1d", "local_1c"]:
	passwd += arr[val]
print(passwd)

[intro_flag.png]

So the flag is 404CTF{5tup1ntr0n1s3}.

This post is licensed under CC BY 4.0 by the author.