⚡
Blog
  • 💲cat ~/README.md
  • CTF
    • GCTF 2023
      • Cryptography
        • Layers of Bases
      • Miscellaneous
        • Master Hidden Within The Slides
      • Pwn
        • Level 1
        • Level 2
        • Level 3
        • Level 4
      • Web
        • Include
    • KnightCTF 2023
      • Networking
      • Miscellaneous
      • Cryptography
        • Factorie
        • Xorathrust
    • Siber Siaga 2023 CTF
  • CAMP
    • Global Cybersecurity Camp 2023
    • Malaysia Cybersecurity Camp 2022
  • CONFERENCE
    • Brewing...
  • WRITE-UP
    • TryHackMe - Attacktive Directory Write-up
Powered by GitBook
On this page

Was this helpful?

  1. CTF
  2. KnightCTF 2023
  3. Cryptography

Xorathrust

PreviousFactorieNextSiber Siaga 2023 CTF

Last updated 7 months ago

Was this helpful?

First, we were given 2 files.

Figure below shows the content of the Python file.

I knew that the script was doing something else, so I tried to run the script, hoped to get a clearer idea on what it was doing. Then, an error was returned, saying that “flag.txt” was not found.

Hmmm, what now? Since I have another file in hand, I decided to give it a shot by renaming the file to “flag.txt”.

I ran the script again after the renaming, and there was no output this time.

Before I had a deeper thought, my muscle memory of doing the “ls” command somehow did the trick for me. I saw that there was a new file being generated.

Yes, reading the content of the file did returned the correct flag.

Final flag: KCTF{ju5t_4_b45ic_x0r}