Skip to content

Latest commit

 

History

History
9 lines (5 loc) · 601 Bytes

challenge.md

File metadata and controls

9 lines (5 loc) · 601 Bytes

Reverse Engineering

We were given with a ELF, I went to gdb to debug that and found the function strcmp and got a string that it was comparing to.

gdb

Here, at <main+78>, we can find that each byte was taken from the string and was being subtrated with 7. So, by adding 7 to each byte of the string we found, we can get our flag.

so..doing that with python we will get our flag flag{y0u_G07_1t}