As there is no flag format for this CTF, this hint provides valuable information. The answer in this online platform so we can, uh, verify it!Īside from being both a taunt and a joke, the message contains a hint: the answer to the question is the flag for this challenge. ![]() If you think you're worthy, then see for yourself. Everybody here solved this ridiculously easy challenge, obviously. This is a call for aid to any reverse engineer that is skilled enough to solve this ![]() When opening the challenge page, one was greeted with the message that is given below. The theme of Hackfest2019 was upside down, although the CTF itself was not bound to this theme. Out of these, there were 18 teams that solved the challenge. In total, 52 teams participated in the classic Hackfest2019 CTF. At last, the challenge’s complete source code and design process will be discussed within this article. Firstly, information about the challenge will be given, after which it will be solved in multiple ways. The challenge has been created by myself. ![]() ![]() In this article, a crack me challenge that was present in the Hackfest2019 classic CTF will be solved. This article was updated on the 30th of April 2020. This article was published on the 14th of November 2019.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |