<< 14/08/2022

How To Defeat a Dragon|

Reverse


I've spend quite some time learning about reverse and studying assembly, This one was my starting task and I got excited to solve ( ‾́ ◡ ‾́ ).

Task :


Task Files : Vault.rar [download]

> After Downloading the attached file I didn't bother running it and I directly threw it into IDA and hit the decompile button (F5).

> By doing that i got this :



> That's obviously the flag, Reading back the task description, Hexadecimal was mentioned, Taking the piece of text inside the curly braces :

5348454c4c4354467b31355f523376337235316e675f333473793f7d

> Putting it inside a decryptor like cyberchef and using the "from hex" add-on gave me this :




> FLAG : SHELLCTF{15_R3v3r51ng_34sy?}