Nouman Rahman
ProgrammingFire

ProgrammingFire

picoCTF 2022: Reverse Engineering: file-run-1

picoCTF 2022: Reverse Engineering: file-run-1

Nouman Rahman's photo
Nouman Rahman
·Oct 16, 2022·

1 min read

Subscribe to my newsletter and never miss my upcoming articles

Play this article

Table of contents

  • Introduction
  • Solution
  • Conclusion

Introduction

Challenge: file-run-1

Category: Reverse Engineering

Description:

A program has been provided to you, what happens if you try to run it on the command line? Download the program here.

Solution

We have been provided with a file called run. If you try to run the file like this:

./run

It won't work as expected. You should first give yourself permission to execute this file.

chmod +x ./run

Now if you try to run this, it will work. Just like this:

./run
picoCTF{U51N6_Y0Ur_F1r57_F113_e5559d46}

Conclusion

This one is what I think is the easiest challenge ever on the picoCTF 2022.

Flag: picoCTF{U51N6_Y0Ur_F1r57_F113_e5559d46}

 
Share this