Skip to content

Latest commit

 

History

History
38 lines (25 loc) · 851 Bytes

crackme-py.md

File metadata and controls

38 lines (25 loc) · 851 Bytes

picoGYM: crackme-py

Author: syreal

Reverse_Engineering category Score: 30

Description

crackme.py

Hints

None

Summary

The python script has everything necassary to get the flag. It just only executes the choose_greatest() function, which is useless. By removing the call for this function and adding a decode_secret(bezos_cc_secret) instead we get the correct flag.

The decoding function performs a ROT47 on every char of the secret which yields the flag.

Flag

Show flag
picoCTF{1|\/|_4_p34|\|ut_8c551048}