Reversing
★★☆☆☆
Easy
Cyclix
Description
Inspired by real-world malware obfuscation techniques, this challenge implements a cyclic encryption routine to hide its secrets.
You are provided with a compiled Linux binary that prompts for a decryption key. The encrypted data is split into multiple parts to make static analysis more challenging. Analyze the binary to understand the encryption mechanism and recover the flag.
Binary Information:
Verify integrity after download:
You are provided with a compiled Linux binary that prompts for a decryption key. The encrypted data is split into multiple parts to make static analysis more challenging. Analyze the binary to understand the encryption mechanism and recover the flag.
Binary Information:
Filename: cyclix
Size: 14,680 bytes (15 KB)
MD5: 26fe34e3745a99211f8fd268b073679f
SHA1: 4003061d4d608d6f2433ae1233eac9d568130475
SHA256: c0bfee719986c09b5bb7ddce208fc974834e39f885f0ddf4adf95d4a90f938de
Verify integrity after download:
md5sum cyclix
sha1sum cyclix
sha256sum cyclix
Please log in to submit flags.
Hints
Hint #1
-15 XP
Hint #2
-20 XP
Hint #3
-30 XP
Discussion
No commentsLog in to comment.
No comments yet. Be the first!