Home CTFs | FCSC2023 | Intro | Aaarg
Post
Cancel

CTFs | FCSC2023 | Intro | Aaarg

Context

context

We are given an executable “aaarg”.

Using ghidra, I spoted this:

ghidra

It seems to be the flag.

I opened the executable in radare2 to have a better view of the flag.

radare2

Then I used cyberchef regex and find/replace to assemble the flag:

operations

Here is the flag 🥳

cyberchef

This post is licensed under CC BY 4.0 by the author.