ping CTF 2023
Ziggarettes [50 pts]
Don’t smoke zigarettes, kids!
e0d8bf8fdefc32df23a1c96f047c50fc.zip
We’re given an ELF binary. I decompiled with Dogbolt and examined the Ghidra code. Here’s the relevant part:
Seems like it’s just a switch statement checking the characters! Only thing to note is that cases that come consecutively, where one case doesn’t have a break statement before the next one, run the same code. Knowing that, brute-forcing becomes trivial:
0123456789abcdef0123456789abcdef0123456789abcdef
ping{z1G_1S_v3RY_C0Ol_234mKIKIO2pl}