VishwaCTF-22 => Overcook (Reverse Engineering)

Challenge Info

Description: Alright, this time you’ll need to control some numerical representations. Can you get the flag from this program?

Vishwa CTF


So, as usual, opening it in Ghidra Code Analyzer and checking its functions

So here, we see something interesting, the “printflag” function. So clicking it and checking the de-compiler (this seems more interesting than main this time 😋).

Here, we can see multiple numbers which would be printed. But these numbers looks a bit interesting, these all have three digits, decimal format also have three digits. So, entering it to CyberChef and entering “From Decimal” in recipe and seeing the output

So here we get the text “r3vers1ng_dud3”. Since the flag format is “vishwaCTF{s3cr3t}”, so our final flag will be “vishwaCTF{r3vers1ng_dud3}


  • Decode all text which seems suspicious.

Get more VishwaCTF-22 writeups here




<broken code>

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Free Publisher Editor And Veiwer For Mac

Tekton and Promise of Reusable Pipelines

Today’s Forecast: Frustrated Stakeholders

Joe asks:

How to filter requests that are coming to a Rest Endpoint in Python

Using Normal Mode Commands in a Terminal Buffer


How to find internal subdomains? YQL, Yahoo! and bug bounty.

My experience with Python 3.9 so far, What I’ve learned.

InvArch Project — Development Updates For November

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Shriyans Sudhi

Shriyans Sudhi

<broken code>

More from Medium

Log #47–18/01/2022

My first week with coloredcow

On Identity

Simple way to compare consumption memory in Ruby using benchmark/memory .