Version
By |
Version |
Comment |
noraj |
1.0 |
Creation |
CTF
Description
I used this program to encrypt a flag. The output was:
n1s4_t1An(f1ctdb@mpl_h3)m3lp3y__Eas
file: λ.py
Solution
TL;DR : that solution is just a trick not a smart de-obfuscation.
- Here is the code of the
λ.py
:
- It's clear that the code is obfuscated, but even beautified it's still a mess.
- So as I don't want my brain to blow trying to de-obfuscate this, I got around.
- I realized that, with enought iteration, we gan get back the original string. So I modified the code to "brute-force" the good combination:
- Here the non-filtered output, that's quite long:
- Now let's see what begins with
ctf(
- That begins to make sense, more filtering:
- Not so hard:
58 ctf(1@mbd4_1nsAn1ty_pl3asE_h3lp_m3)
.