Project Sekai
🔒 WolvCTF 2023 / 🩸-reverse-atari_magic
Sutx
BOT
03/17/2023 1:39 PM
atari_magic - 500 points
Category:
Reverse
Description:
Retrocomputing fun. This challenge is authored and sponsored by
Caesar Creek Software
.
Files:
https://wolvctf.io/files/3fa36bb8594556cb18dd6c777fd39c8a/Magic.tos?token=eyJ1c2VyX2lkIjoyNjgsInRlYW1faWQiOjE3MCwiZmlsZV9pZCI6NzN9.ZBTQCg.cC4pJeX_gaVAO03TaCIoqIrYPFQ
Tags:
Wade#3516
Sutx
pinned
a message
to this channel.
03/17/2023 1:39 PM
Sutx
BOT
03/17/2023 7:37 PM
@Violin
wants to collaborate
Sutx
BOT
03/17/2023 11:12 PM
@4n0nym4u5
wants to collaborate
Sutx
BOT
03/18/2023 1:03 AM
@crazyman ai
wants to collaborate
Sutx
BOT
03/18/2023 3:01 AM
@TheBadGod
wants to collaborate
TheBadGod
03/18/2023 3:01 AM
wtfc{}_nf3mn_n1l34yskd40
(edited)
03:01
just gotta figure out the order lol
TheBadGod
used /ctf submit
Sutx
BOT
03/18/2023 3:14 AM
Well done, you got first blood!
sahuang
03/18/2023 5:18 AM
did you use an emulator or just grepped a string and scrambled?
05:18
couldnt get tos stuff decompiled even
TheBadGod
03/18/2023 5:18 AM
i disassembled the stuff, saw that there are a bunch of sus checks
05:19
like it loads d1 from an offset of a1
move.b offset(a1), d1
, then performs some action on d1 and compares it to another constant byte
sahuang
03/18/2023 5:19 AM
ooh
TheBadGod
03/18/2023 5:19 AM
there were just 5 actions, add, sub, xor, ror, rol; so it was easy to reverse
05:19
and then just had to look at the offset (because they were not in order) to determine the correct index
sahuang
couldnt get tos stuff decompiled even
TheBadGod
03/18/2023 5:20 AM
yeah same, just got rid of the first 0x1c bytes and told ida to disassemble m68k
sahuang
03/18/2023 5:20 AM
i see
nice to know, i prob gonna upsolve later for that disassembld stuff analysis
Exported 18 message(s)