Email or username:

Password:

Forgot your password?
q3k :blobcatcoffee:

I would like to thank Jia Tan for authoring the best CTF challenge of the past decade.

7 comments
Anisse

@q3k it's *that* hard to reverse? Or is it the thrill? (Or the joke?)

q3k :blobcatcoffee:

@Aissen It's hard to reverse engineer (but not _too_ hard), it has a bunch of interesting technical tricks, the code does something actually interesting and novel, and it's well paced to RE (you are super lost until you discover something small that you can anchor off of, then a bunch of other puzzle pieces fall into place... multiple times!).

Even without the thrill it would make an _excellent_ RE CTF challenge, but the thrill only adds to it!

q3k :blobcatcoffee:

@redford The flag is stored in `uint bd_inject_key(ulong param_1,undefined4 param_2,int param_3,uint param_4)` somewhere, better figure it out!

niconiconi

@q3k@social.hackerspace.pl I thought it was the best pentest of the past decade.

AN/CRM-114

@q3k pease come on down to Quantico, VA to collect your prize

Go Up