I would like to thank Jia Tan for authoring the best CTF challenge of the past decade.
I would like to thank Jia Tan for authoring the best CTF challenge of the past decade. 7 comments
@Aissen It's hard to reverse engineer (but not _too_ hard), it has a bunch of interesting technical tricks, the code does something actually interesting and novel, and it's well paced to RE (you are super lost until you discover something small that you can anchor off of, then a bunch of other puzzle pieces fall into place... multiple times!). Even without the thrill it would make an _excellent_ RE CTF challenge, but the thrill only adds to it! @redford The flag is stored in `uint bd_inject_key(ulong param_1,undefined4 param_2,int param_3,uint param_4)` somewhere, better figure it out! |
@q3k it's *that* hard to reverse? Or is it the thrill? (Or the joke?)