2016-04-15:

Sources of ReRe, a Python RE500 challenge

ctf:dragon sector
ReRe
The CONFidence Teaser CTF 2016 by Dragon Sector is now over and the results are in (congratz 9447!). Therefore I decided to share the sources of my task called ReRe, which was a Python rainbow-heavy obfuscation-heavy bytecode-all-around challenge. I won't spoil too much in case you would like to try to solve it (crackme/rere.py in the archive), but if you would like to read more on it, just see the SOLUTION.md file in the zip file. I'll add, that the obfuscation used self-modifying bytecode, some bytecode-level obfuscation and minor string obfuscation as well, so if you would like to learn more about Python 2.7 internal code representation, try your luck with ReRe :) It was solved 5 times btw.

Download: confidence-teaser-2016-ds-gynvael-rere.zip
"Video": rere_anim.gif (a 3 MB gif, you have been warned)
Have fun, good luck!

Comments:

2016-04-18 08:42:45 = WhiteLightning
{
Gyn, could you make available somewhere code/binary for A'mazeing (or what was the name) game?

}
2016-04-18 09:56:26 = Gynvael Coldwind
{
@WhiteLightning
I'll ask the author (KeiDii) about it :)
}
2016-04-18 21:47:59 = KeiDii
{
begin spam
https://github.com/k3idii/ctf_task_aMazeing
end
}
2016-04-19 17:12:00 = PyjamaLama
{
Have anyone solved j00ru's challenge? Or have j00ru published the explanation somewhere?
}
2016-04-19 18:00:15 = Gynvael Coldwind
{
@PyjamaLama
One team after the CTF according to IRC logs. No write-up yet though.
}
2016-04-20 09:25:57 = WhiteLightning
{
KeiDii, Gyn - thx for github link for aMazeing.
}

Add a comment:

Nick:
URL (optional):
Math captcha: 6 ∗ 10 + 5 =