I heard RISC was pretty good, so I reduced it some more! Check out my password checker program I wrote with it.
7/10 (Difficult)
pctf{vm_r3vers3inG_1s_tr1cky}
Christopher Roberts (caffix)
me?
It's a simple VM reversing problem. Figure out how it's decodeing and executing instruction. Then either figure out how to set breakpoints on the cmp instructions or follow along with my factorization inside the VM.
bash solve.sh
Then each of the numbers used is actually 4 byte chunks of the flag eg 1885566054 is 0x70637466 which is "pctf"
- vm
- password_checker.smol