ATHACK CTF

REVERSING CATEGORY

trustie_rity
1 min readJan 12, 2022

S0Lving_p0lyn0mials_OR_bRuteF0rcing

This writeup is about a reversing challenge i came around last year at the AtHackCtf .

challenge

A python script is provided

This script is basically getting the integer representation of the ascii character of the flag one by one using the ord() function . The code then goes ahead to do some calculations with the integer to yield a very large number. When i run the script i get :

cipher = [317336, 1696274, 425598, 1007448, 1069008, 1340288, 346128, 663858, 392496, 2013024, 2110256]

Remember these are the values you get after the script transforms the characters of this flag partAtHackCTF{}” . Our task therefore , is to get the other characters of the flag ,from a provided output of the whole flag that we get from the author also.

Solution

You might have figured that this process is kind of irreversible , we can only do it one way. That is trying different characters and matching if the output matches what we have already. We also need to automate this process to save on time. I made a simple script to try just that :

Flag :

AtHackCTF{Which_1s_M0re_Fun_S0Lving_p0lyn0mials_OR_bRuteF0rcing?!}

--

--

trustie_rity
trustie_rity

Written by trustie_rity

Offensive Penetration Tester | M4lici0s Lif3 | Find video walkthroughs on my yt channel: https://www.youtube.com/@trustie_rity https://johnkiguru1337.github.io/

No responses yet