PW Crack 2
Tags: General Skills, password_cracking
Author: LT ‘syreal’ Jones
Description
Can you crack the password to get the flag?
Download the password checker here and you’ll need the encrypted flag in the same directory too.
Hints
- Does that encoding look familiar?
- The
str_xor
function does not need to be reverse engineered for this challenge.Approach
When we look at line 18, we see
if( user_pw == chr(0x35) + chr(0x39) + chr(0x30) + chr(0x39) ):
and upon looking at hint 1, we can realize it should be the exact same encoding as the previous question, Glitch Cat We can now runprint(chr(0x35) + chr(0x39) + chr(0x30) + chr(0x39))
in either the Python shell or a new Python file and this outputs “5909”.
The rest we can approach the same way as PW Crack 1, make sure the files are in the same directory and run it, then input the password.Please enter correct password for flag: 5909 Welcome back... your flag, user: picoCTF{tr45h_51ng1ng_b0539d96}
Flag
picoCTF{tr45h_51ng1ng_b0539d96}