Shattered Memories

Reverse Engineering Challenge

I swear I knew what the flag was but I can't seem to remember it anymore... can you dig it out from my inner psyche?

this is the file that was given

We were given a file, so I first tried to find out what type of file it was.

Huh, so it is an ELF 64-bit. Therefore, we can reverse engineer it using Ghidra and take a look at the decompile panel.

If you look at the code above, it compares the user input with the specified flag. Therefore, we need to reconstruct it until it provides the output telling us that we have already got the flag

lactf{not_what_forgive_and_forget_means}

Last updated