Sources of ReRe, a Python RE500 challenge

ctf:dragon sector
The CONFidence Teaser CTF 2016 by Dragon Sector is now over and the results are in (congratz 9447!). Therefore I decided to share the sources of my task called ReRe, which was a Python rainbow-heavy obfuscation-heavy bytecode-all-around challenge. I won't spoil too much in case you would like to try to solve it (crackme/rere.py in the archive), but if you would like to read more on it, just see the SOLUTION.md file in the zip file. I'll add, that the obfuscation used self-modifying bytecode, some bytecode-level obfuscation and minor string obfuscation as well, so if you would like to learn more about Python 2.7 internal code representation, try your luck with ReRe :) It was solved 5 times btw.

Download: confidence-teaser-2016-ds-gynvael-rere.zip
"Video": rere_anim.gif (a 3 MB gif, you have been warned)
Have fun, good luck!


2016-04-18 08:42:45 = WhiteLightning
Gyn, could you make available somewhere code/binary for A'mazeing (or what was the name) game?

2016-04-18 09:56:26 = Gynvael Coldwind
I'll ask the author (KeiDii) about it :)
2016-04-18 21:47:59 = KeiDii
begin spam
2016-04-19 17:12:00 = PyjamaLama
Have anyone solved j00ru's challenge? Or have j00ru published the explanation somewhere?
2016-04-19 18:00:15 = Gynvael Coldwind
One team after the CTF according to IRC logs. No write-up yet though.
2016-04-20 09:25:57 = WhiteLightning
KeiDii, Gyn - thx for github link for aMazeing.

Add a comment:

URL (optional):
Math captcha: 1 ∗ 7 + 9 =