Investigative Reversing 0

Description
We have recovered a binary and an image. See what you can make of it. There should be a flag somewhere.
Now we have two files mystery and mystery.png
I staretd with the analysis on the image file . For that purpose i used aperisolve and hexeditor


we can clearly see it the flag but it is encoded. Hmm...Now lets check the binary file
In order to decompile binary you can use any tool . I am using dogbolt
The program opens
flag.txt, reads 26 bytes from it, and writes a manipulated version tomystery.png.Key processing:
Bytes 6–14 are incremented by 5 before being written.
15th Byte is decremented by 3 before being written.
Bytes 16–25 are written as-is.
We have the encoded version of flag, now we can write a simple python script to get the original flag
Last updated