Shattered Memories
Reverse Engineering Challenge
I swear I knew what the flag was but I can't seem to remember it anymore... can you dig it out from my inner psyche?
We were given a file, so I first tried to find out what type of file it was.

Huh, so it is an ELF 64-bit. Therefore, we can reverse engineer it using Ghidra and take a look at the decompile panel.

If you look at the code above, it compares the user input with the specified flag. Therefore, we need to reconstruct it until it provides the output telling us that we have already got the flag
lactf{not_what_forgive_and_forget_means}
Last updated