Files
furtest.fr/content/writeups/2024/spookyCTF/reverse/what_flag/index.md
furtest 34634f73c1 Adds CTFs to content
Add CTFs from 2024 to the content, htb apocalypse, spookyCTF,
buckeye ctf and some edits to the 404 ctf
2025-06-27 14:45:23 +02:00

701 B

+++ date = '2024-10-28T09:17:00+02:00' draft = false title = 'What flag' tags = [ 'reverse' ] +++

Intro

Name: what-flag
Description: NICC recieved a mysterious email with an executable file that does nothing. Can you figure out what this executable does?
Author: TomB

This is reverse engineering. The binary is not stripped, lets go with binary ninja.

Solve

Main does nothing however we see a few functions named : u, h, h2, f, l, a, g Looking inside of them we see what seems to be part of the flag. Let's put these together

  • u : NI
  • h : CC
  • h2 : {
  • f : uhH
  • l : _fl@g
  • a : _i
  • g : _ThInk} We get : NICC{uhH_fl@g_i_ThInk}