<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://wiki-hack.didzko.xyz/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://wiki-hack.didzko.xyz/feed.php">
        <title>Wiki-hack - challenges:anssi-ecsc-2019:reverse</title>
        <description></description>
        <link>https://wiki-hack.didzko.xyz/</link>
        <image rdf:resource="https://wiki-hack.didzko.xyz/lib/exe/fetch.php?media=wiki:dokuwiki.svg" />
       <dc:date>2026-04-19T13:06:41+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://wiki-hack.didzko.xyz/doku.php?id=challenges:anssi-ecsc-2019:reverse:am-i-computable&amp;rev=1608063380&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki-hack.didzko.xyz/doku.php?id=challenges:anssi-ecsc-2019:reverse:ariane&amp;rev=1608063493&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki-hack.didzko.xyz/doku.php?id=challenges:anssi-ecsc-2019:reverse:cryptomix&amp;rev=1608063467&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki-hack.didzko.xyz/doku.php?id=challenges:anssi-ecsc-2019:reverse:donotdebugme&amp;rev=1608063532&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki-hack.didzko.xyz/doku.php?id=challenges:anssi-ecsc-2019:reverse:frankenstein&amp;rev=1608063442&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki-hack.didzko.xyz/doku.php?id=challenges:anssi-ecsc-2019:reverse:the-pytector&amp;rev=1608063351&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki-hack.didzko.xyz/doku.php?id=challenges:anssi-ecsc-2019:reverse:vault&amp;rev=1608063325&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki-hack.didzko.xyz/doku.php?id=challenges:anssi-ecsc-2019:reverse:ybab&amp;rev=1608063296&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://wiki-hack.didzko.xyz/lib/exe/fetch.php?media=wiki:dokuwiki.svg">
        <title>Wiki-hack</title>
        <link>https://wiki-hack.didzko.xyz/</link>
        <url>https://wiki-hack.didzko.xyz/lib/exe/fetch.php?media=wiki:dokuwiki.svg</url>
    </image>
    <item rdf:about="https://wiki-hack.didzko.xyz/doku.php?id=challenges:anssi-ecsc-2019:reverse:am-i-computable&amp;rev=1608063380&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-12-15T20:16:20+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>am-i-computable</title>
        <link>https://wiki-hack.didzko.xyz/doku.php?id=challenges:anssi-ecsc-2019:reverse:am-i-computable&amp;rev=1608063380&amp;do=diff</link>
        <description>ANSSI ECSC ~~ Challenges reverse ~~ Am I Computable

Retour

-

Présentation

Nous avons récupéré cet exécutable amicomputable qui n'a pas l'air de fonctionner avec le fichier fourni file.dat.

Pouvez-vous nous donner la sortie affichée ?

1 - aaa

2 - bbb</description>
    </item>
    <item rdf:about="https://wiki-hack.didzko.xyz/doku.php?id=challenges:anssi-ecsc-2019:reverse:ariane&amp;rev=1608063493&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-12-15T20:18:13+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>ariane</title>
        <link>https://wiki-hack.didzko.xyz/doku.php?id=challenges:anssi-ecsc-2019:reverse:ariane&amp;rev=1608063493&amp;do=diff</link>
        <description>ANSSI ECSC ~~ Challenges reverse ~~ Ariane

Retour

-

Présentation

$ sha256sum ariane.exe
73767b072a20e1616c1d7b07b631c30b2c9cee93ad08582f9c759b465abc3d0e ariane.exe

Note : le flag n'est pas de la forme ECSC{xxxx}.
En revanche, il est à rentrer sous la forme ECSC{yyyy} où yyyy est la chaîne en entrée du challenge.</description>
    </item>
    <item rdf:about="https://wiki-hack.didzko.xyz/doku.php?id=challenges:anssi-ecsc-2019:reverse:cryptomix&amp;rev=1608063467&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-12-15T20:17:47+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>cryptomix</title>
        <link>https://wiki-hack.didzko.xyz/doku.php?id=challenges:anssi-ecsc-2019:reverse:cryptomix&amp;rev=1608063467&amp;do=diff</link>
        <description>ANSSI ECSC ~~ Challenges reverse ~~ CryptoMix

Retour

-

Présentation

Pas de description

2 fichiers :

	*  cryptomix
	*  secret.cipher

1 - aaa

2 - bbb</description>
    </item>
    <item rdf:about="https://wiki-hack.didzko.xyz/doku.php?id=challenges:anssi-ecsc-2019:reverse:donotdebugme&amp;rev=1608063532&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-12-15T20:18:52+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>donotdebugme</title>
        <link>https://wiki-hack.didzko.xyz/doku.php?id=challenges:anssi-ecsc-2019:reverse:donotdebugme&amp;rev=1608063532&amp;do=diff</link>
        <description>ANSSI ECSC ~~ Challenges reverse ~~ DoNotDebugMe

Retour

-

Présentation


C'est le retour de l'analyse statique :-)


1 fichier :

	*  DoNotDebugMe.exe

1 - aaa

2 - bbb</description>
    </item>
    <item rdf:about="https://wiki-hack.didzko.xyz/doku.php?id=challenges:anssi-ecsc-2019:reverse:frankenstein&amp;rev=1608063442&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-12-15T20:17:22+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>frankenstein</title>
        <link>https://wiki-hack.didzko.xyz/doku.php?id=challenges:anssi-ecsc-2019:reverse:frankenstein&amp;rev=1608063442&amp;do=diff</link>
        <description>ANSSI ECSC ~~ Challenges reverse ~~ Frankenstein

Retour

-

Présentation


WGRAEHAAAAHAAHAHDAZHDAAHEAZHEHAZEHAZEAHAZ


1 fichier :

	*  frankenstein

1 - aaa

2 - bbb</description>
    </item>
    <item rdf:about="https://wiki-hack.didzko.xyz/doku.php?id=challenges:anssi-ecsc-2019:reverse:the-pytector&amp;rev=1608063351&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-12-15T20:15:51+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>the-pytector</title>
        <link>https://wiki-hack.didzko.xyz/doku.php?id=challenges:anssi-ecsc-2019:reverse:the-pytector&amp;rev=1608063351&amp;do=diff</link>
        <description>ANSSI ECSC ~~ Challenges reverse ~~ The Pytector

Retour

-

Présentation


Retrouver le numéro de série pour valider le challenge


1 fichier :

	*  check_serial.zip

1 - aaa

2 - bbb</description>
    </item>
    <item rdf:about="https://wiki-hack.didzko.xyz/doku.php?id=challenges:anssi-ecsc-2019:reverse:vault&amp;rev=1608063325&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-12-15T20:15:25+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>vault</title>
        <link>https://wiki-hack.didzko.xyz/doku.php?id=challenges:anssi-ecsc-2019:reverse:vault&amp;rev=1608063325&amp;do=diff</link>
        <description>ANSSI ECSC ~~ Challenges reverse ~~ Vault

Retour

-

Présentation


Saurez-vous retrouver la clé pour rentrer dans le coffre ?


1 fichier :

	*  Vault

1 - aaa

2 - bbb</description>
    </item>
    <item rdf:about="https://wiki-hack.didzko.xyz/doku.php?id=challenges:anssi-ecsc-2019:reverse:ybab&amp;rev=1608063296&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-12-15T20:14:56+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>ybab</title>
        <link>https://wiki-hack.didzko.xyz/doku.php?id=challenges:anssi-ecsc-2019:reverse:ybab&amp;rev=1608063296&amp;do=diff</link>
        <description>ANSSI ECSC ~~ Challenges reverse ~~ ybab

Retour

8-) owned 8-)

Présentation

.semèlborp ed resop suov sap tiarved en egnellahc eC

fichier baby sans extension

Nope, I won't give you the flag *that* easily!

1 - strings

strings baby


/lib64/ld-linux-x86-64.so.2
libc.so.6
exit
puts
printf
__cxa_finalize
__libc_start_main
GLIBC_2.2.5
_ITM_deregisterTMCloneTable
__gmon_start__
_ITM_registerTMCloneTable
=g
=j
AWAVI
AUATL
[]A\A]A^A_
ECSC{cdcd13c4c81a23a21506fa8efa5edff781e9fe80}
The flag is %s.
N…</description>
    </item>
</rdf:RDF>
