Skip to content

Latest commit

 

History

History
35 lines (23 loc) · 873 Bytes

File metadata and controls

35 lines (23 loc) · 873 Bytes

picoCTF 2022: unpackme.py

Author: LT 'syreal' Jones

Reverse_Engineering category Score: 100 Solved

Description

Can you get the flag?
Reverse engineer this Python program.

Hints

None

Summary

First understand what this program does.
It decrypts payload with a key_str and executes the stuff in payload. So if we print the decrypted payload we can get a hardcoded password. I just patched the file by adding one print statement.

Flag

Show flag
picoCTF{175_chr157m45_45a1a353}