Investigative Reversing 0

Description

We have recovered a binary and an image. See what you can make of it. There should be a flag somewhere.

Now we have two files mystery and mystery.png

I staretd with the analysis on the image file . For that purpose i used aperisolve and hexeditor

Aperisolve
HexEditor

we can clearly see it the flag but it is encoded. Hmm...Now lets check the binary file

In order to decompile binary you can use any tool . I am using dogbolt

  • The program opens flag.txt, reads 26 bytes from it, and writes a manipulated version to mystery.png.

  • Key processing:

    • Bytes 6–14 are incremented by 5 before being written.

    • 15th Byte is decremented by 3 before being written.

    • Bytes 16–25 are written as-is.

We have the encoded version of flag, now we can write a simple python script to get the original flag

Last updated