HTB - Maze (Reversing)
by paven - Saturday February 10, 2024 at 01:49 AM
#11
(Aug 15, 2024, 05:04 PM)x1rx Wrote:
from pwn import *

encrypted_flag_array = [273, 308, 290, 254, 230, 271, 232, 254, 260, 279, 210, 232, 273, 325, 303, 264, 217, 221, 204, 263, 215, 258, 230, 283, 237, 268, 259, 287, 224, 219, 193, 192, 135, 117, 191]

flag = ["H", "T", "B"]

p = log.progress("flag")
i = 0
for enc_value in encrypted_flag_array:
    c = enc_value - (ord(flag[i + 1]) + ord(flag[i + 2]))
    flag.append(chr(c))
    i += 1
    p.status(''.join(flag))

how to find the valid encrypted arrays?
Reply
#12
(Jan 27, 2025, 02:43 AM)christopher5gb Wrote:
(Aug 15, 2024, 05:04 PM)x1rx Wrote:
from pwn import *

encrypted_flag_array = [273, 308, 290, 254, 230, 271, 232, 254, 260, 279, 210, 232, 273, 325, 303, 264, 217, 221, 204, 263, 215, 258, 230, 283, 237, 268, 259, 287, 224, 219, 193, 192, 135, 117, 191]

flag = ["H", "T", "B"]

p = log.progress("flag")
i = 0
for enc_value in encrypted_flag_array:
    c = enc_value - (ord(flag[i + 1]) + ord(flag[i + 2]))
    flag.append(chr(c))
    i += 1
    p.status(''.join(flag))

how to find the valid encrypted arrays?
i find this https://hackmd.io/@0xMikiko/MediumPart3#...ge-18-Maze
Reply
#13
That's of a great help!

Thank you, sir!
Much appreciated!
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 47 3,733 1 hour ago
Last Post: Stiv1212
  [MEGALEAK] HackTheBox ProLabs, Fortress, Endgame - Alchemy, 250 Flags, leak htb-bot htb-bot 98 9,077 Yesterday, 08:05 PM
Last Post: Zacker90
  SVCHOST Injector 2026 opsecmaster67 0 95 Yesterday, 01:41 PM
Last Post: opsecmaster67
  Cold Seal 5.6 cracked Sensitive information can be exposed or stolen opsecmaster67 0 81 Yesterday, 01:38 PM
Last Post: opsecmaster67
  EagleRAT v2.5 Create backdoor access points opsecmaster67 0 75 Yesterday, 01:37 PM
Last Post: opsecmaster67

Forum Jump:


 Users browsing this forum: 1 Guest(s)