InCTF 2014 - Reverse 50
1. First Challenge was given python compiled File
Used Python decompiler to get the original code.
Next is the compiled java class file, I used jad decompiler to get the original class file
root@Vijay:~/Desktop/inctf 14/reverse# file one one: python 2.7 byte-compiled I got the printable sequence array values. eflag = [131, ... 138, ... 219, ... 198, ... 201, ... 158, ... 151, ... 154, ... 134, ... 129, ... 128, ... 177, ... 135, ... 157, ... 177, ... 157, ... 154, ... 135, ... 130, ... 130, ... 177, ... 141, ... 129, ... 129, ... 130, ... 201, ... 199] >>> eflag [131, 138, 219, 198, 201, 158, 151, 154, 134, 129, 128, 177, 135, 157, 177, 157, 154, 135, 130, 130, 177, 141, 129, 129, 130, 201, 199] >>> >>> flag = ''.join(map(chr, map(lambda x: x ^ 238, eflag))) >>> >>> print flag md5('python_is_still_cool')
root@Vijay:~/Desktop/inctf 14/reverse# file two.class two.class: compiled Java class data, version 51.0 root@Vijay:~/Desktop/inctf 14/reverse# jad two.class Parsing two.class...The class file version is 51.0 (only 45.3, 46.0 and 47.0 are supported) Generating challenge.jad I got the printable sequence array values. >>> flag2 = [106, 97, 50, 37, 36, 103, 94, 115, 94, 92, 96, 101, 94, 105, 105, 98, 107, 100, 98, 112, 92, 94, 111, 98, 92, 112, 113, 102, 105, 105, 92, 98, 94, 112, 118, 36, 38] >>> ''.join([chr(i+3) for i in flag2]) "md5('java_challenges_are_still_easy')"
Comments
Post a Comment