InCTF 2014 - Reverse 50
1. First Challenge was given python compiled File
Used Python decompiler to get the original code.
Next is the compiled java class file, I used jad decompiler to get the original class file
root@Vijay:~/Desktop/inctf 14/reverse# file one
one: python 2.7 byte-compiled
I got the printable sequence array values.
eflag = [131,
... 138,
... 219,
... 198,
... 201,
... 158,
... 151,
... 154,
... 134,
... 129,
... 128,
... 177,
... 135,
... 157,
... 177,
... 157,
... 154,
... 135,
... 130,
... 130,
... 177,
... 141,
... 129,
... 129,
... 130,
... 201,
... 199]
>>> eflag
[131, 138, 219, 198, 201, 158, 151, 154, 134, 129, 128, 177, 135, 157, 177, 157, 154, 135, 130, 130, 177, 141, 129, 129, 130, 201, 199]
>>>
>>> flag = ''.join(map(chr, map(lambda x: x ^ 238, eflag)))
>>>
>>> print flag
md5('python_is_still_cool')
root@Vijay:~/Desktop/inctf 14/reverse# file two.class
two.class: compiled Java class data, version 51.0
root@Vijay:~/Desktop/inctf 14/reverse# jad two.class
Parsing two.class...The class file version is 51.0 (only 45.3, 46.0 and 47.0 are supported)
Generating challenge.jad
I got the printable sequence array values.
>>> flag2 = [106, 97, 50, 37, 36, 103, 94, 115, 94, 92, 96, 101, 94, 105, 105, 98, 107, 100, 98, 112, 92, 94, 111, 98, 92, 112, 113, 102, 105, 105, 92, 98, 94, 112, 118, 36, 38]
>>> ''.join([chr(i+3) for i in flag2])
"md5('java_challenges_are_still_easy')"
Comments
Post a Comment