diff options
author | n0p <0x90@n0p.cc> | 2018-10-25 23:14:29 +0200 |
---|---|---|
committer | n0p <0x90@n0p.cc> | 2018-10-25 23:14:29 +0200 |
commit | 6814897ce2de08180b6537fcccfb104827e2a131 (patch) | |
tree | cf07de03d5800f8dd6e1c265e6122f8fcb650655 /README.md | |
download | ForgetfulCommander-6814897ce2de08180b6537fcccfb104827e2a131.tar.gz ForgetfulCommander-6814897ce2de08180b6537fcccfb104827e2a131.zip |
Init.
Diffstat (limited to 'README.md')
-rw-r--r-- | README.md | 31 |
1 files changed, 31 insertions, 0 deletions
diff --git a/README.md b/README.md new file mode 100644 index 0000000..4365b85 --- /dev/null +++ b/README.md @@ -0,0 +1,31 @@ +Forgetful Commander +=================== + +# Author +n0p + +# Description +All typos in the flag are on purpose (brute-force prevention...)! + + +# Challenge Text +``` +And you lost a key again. This time it's the key to your missiles command +station. However, the command station got a silent password override. Even +though your memory isn't that good, you don't remember the password either, +your technical skills are!. You've already dumped the binary, which checks the +password. Now you just have to reverse it! +``` + +# Setup +packer.py builds everything. Requires clang. + +# Solution +Simple packer. Main program checks the argument against some XOR stuff. +Depending on the trap flag, the argument is checked against the fail string. + +# Point Value +dynamic + +# Flag +flag{Just_type__Please__and_the_missles_will_be_launched.} |