Sharif University CTF 2016 : dMd
How to solve
Just read the hardcoded data, and throw it to somekind of MD5 cracker (online tool is fine, I have used CrackStation.)
Result:
Flag
grape
Sharif University CTF 2016 : Serial
How to solve
Just read the hardcoded flag.
Flag
EX9dmq4c8g9G7bAV
Sharif University CTF 2016 : SRM
How to solve
Decompile distributed executable file, and read hardcoded flag.
Flag
CZ9dmq4c8g9G7bAX
Sharif University CTF 2016 : Android App
How to solve
Decompile libadnjni.so
using IDA or Ghidra to collect a characters of flag.
'e'+chr(0x66)+chr(0x35)+chr(0x37)+chr(0x66)+chr(0x33)+chr(0x66)+chr(0x65)+chr(0x33)+chr(99)+chr(0x66)+chr(0x36)+chr(0x30)+chr(0x33)+chr(99)+chr(0x30)+chr(0x33)+chr(0x38)+chr(0x39)+chr(0x30)+chr(0x65)+chr(0x65)+chr(0x35)+chr(0x38)+chr(0x38)+chr(0x38)+chr(0x37)+chr(0x38)+chr(99)+chr(0x30)+chr(0x65)+'c'
Combine them, and enter it to the app by running APK file on simulator (on Android Studio).
Flag
Sharif_CTF{833489ef285e6fa80690099efc5d9c9d}
Nuit du Hack CTF Quals 2016 : Matriochka - Step 2
How to solve
I have extracted some decompiled code to collect the flag.
((flaglen + 1) * 0x2a == 0x1f8) // Length of flag is 12 cVar1 = **(char **)(argv + 8) cVar2 = *(char *)(*(long *)(argv + 8) + 3) cVar3 = **(char **)(argv + 8) cVar4 = *(char *)(*(long *)(argv + 8) + 6) cVar5 = *(char *)(*(long *)(argv + 8) + 5) (int)*(char *)(*(long *)(argv + 8) + 8) - (int)*(char *)(*(long *)(argv + 8) + 7) == 0xd && ((int)*(char *)(*(long *)(argv + 8) + 2) - (int)*(char *)(*(long *)(argv + 8) + 1) == 0xd && (*(char *)(*(long *)(argv + 8) + 4) == 'i' && (*(char *)(*(long *)(argv + 8) + 3) == *(char *)(*(long *)(argv + 8) + 9) && (*(char *)(*(long *)(argv + 8) + 1) + -0x11 == (int)**(char **)(argv + 8) && (*(char *)(*(long *)(argv + 8) + 1) == *(char *)(*(long *)(argv + 8) + 10) && (*(char *)(*(long *)(argv + 8) + 1) == *(char *)(*(long *)(argv + 8) + 7) && (long)cVar5 == flaglen * 9 + -4 && (cVar3 + 0x10 == cVar4 + -0x10 && (((int)cVar2 & 0x7fffffffU) == 100 && cVar1 == 'P')))
According to the information written above, we can calculate the flag.
ord()
and chr()
of Python is very useful on this procedure :)
Flag
Pandi_panda
Nuit du Hack CTF Quals 2016 : Matriochka - Step 1
How to solve
if (argc == 2) { iVar1 = strcmp(*(char **)(argv + 8),"Much_secure__So_safe__Wow"); if (iVar1 == 0) {
Flag
Much_secure__So_safe__Wow
Internetwache CTF 2016 : ServerfARM
How to solve
Flag Part 1:
Flag Part 2:
Flag Part 3:
......... continue until you get the whole flag.
Flag
IW{S.E.R.V.E.R>=F:A:R:M}