Execution Style
Execution Style
I loved the part where you ended up with a hackvm program… And I instantly recognized it as such
-
- Posts: 44
- Joined: Mon Feb 16, 2009 4:11 pm
- Location: UK
-
- Posts: 106
- Joined: Thu Oct 29, 2009 9:21 pm
I'm glad he didn't. ;p
I solved most of it by using http://codepad.org, seeing as I don't have a Perl interpreter with me. I couldn't figure out the C language so I just converted it to python.
this was a very nice challenge, even though the "executable" confused me a lot ... till i found the 7z string in it . i used a small php script to extract the "executable" btw.:
Code: Select all
#!/usr/bin/env php
<?php
$dat = file_get_contents(__DIR__ . '/Doll2.png');
if (preg_match('/IDAT(.*?)IEND/s', $dat, $match)) {
file_put_contents(__DIR__ . '/Doll2.bin', gzinflate(substr($match[1], 2, -4)));
}
Great Challenge
I really loved this one. Didn't take that long, but was great fun.
Suppose I skipped the executable step, just extracted the 7z directly, without the executable wrapper. Was that intended or just luck? ^^
About the first step, yes, it was about recognizing that some binary data is encoded in the picture ... but it was kind of obvious.
Suppose I skipped the executable step, just extracted the 7z directly, without the executable wrapper. Was that intended or just luck? ^^
About the first step, yes, it was about recognizing that some binary data is encoded in the picture ... but it was kind of obvious.