Project Sekai
🔒 GDG Algiers CTF 2022 / ✅-reverse-oldschool
Sutx
BOT
10/07/2022 11:01 AM
oldschool - 500 points
Category:
Reverse
Description:
> You'll probably recognize this format just by looking at the size of the binary file
Author
: red0xff
Files:
https://ctf.gdgalgiers.com/files/a0414de4979741f38f94ff54006aa243/oldschool?token=eyJ1c2VyX2lkIjo0MzksInRlYW1faWQiOjE3NSwiZmlsZV9pZCI6NTF9.Y0Bpbw.NJF8LReYsFByi7NcAdBTpa_VsBM
Tags:
No tags.
Sutx
pinned
a message
to this channel.
10/07/2022 11:01 AM
Sutx
BOT
10/07/2022 12:55 PM
@TheBadGod
wants to collaborate
sahuang
10/07/2022 1:10 PM
its some sort of floppy disk?
TheBadGod
10/07/2022 1:10 PM
yes
sahuang
10/07/2022 1:10 PM
512 bytes
TheBadGod
10/07/2022 1:10 PM
boot sector
13:10
reads 8 bytes and then verifies them somehow
sahuang
10/07/2022 1:11 PM
which decoder did u use?
13:11
bootcode_parser?
TheBadGod
10/07/2022 1:11 PM
metapc
13:11
default
13:11
but in ida32, and loaded at offset 0x7c00
13:11
and when asked if its 16 or 32 bit code select 16 bit (so not 32 bit)
sahuang
10/07/2022 1:12 PM
ic
13:12
oh wait ida can recognize it?
TheBadGod
10/07/2022 1:12 PM
yeah
13:12
or well no
13:12
its just a binary file after all
sahuang
10/07/2022 1:14 PM
i did the same but no graphy view, weird
TheBadGod
10/07/2022 1:14 PM
make a function (using p) then press space
sahuang
10/07/2022 1:14 PM
oh thx
13:14
didn know it
TheBadGod
used /ctf solve
Sutx
BOT
10/07/2022 1:33 PM
✅ Challenge solved.
TheBadGod
10/07/2022 1:34 PM
ctf{w00TMbrR}
sahuang
10/07/2022 1:34 PM
god
Exported 26 message(s)