Tags: rev 

Rating:

# Cracker Barrel (50 points at the end)

## Question

I found a USB drive under the checkers board at cracker barrel. My friends told me not to plug it in but surely nothing bad is on it?

I found this file, but I can't seem to unlock it's secrets. Can you help me out?

Also.. once you think you've got it I think you should try to connect to challenges.auctf.com at port 30000 not sure what that means, but it written on the flash drive..

Original Author: nadrojisk

## Long Writeup

There's a section called check, which uses three parts (check_1, check_2, and check_3).

Keep in mind that the CTF uses sym.remove_newline, which basically changes '\n' to '\0'. Therefore, if there are two opposing things, just type the first one, and the second one does **NOT** matter since `strcmp` only checks till the next '\0'.

So, here's `check_1`:

![check_1](./Pics/cracker/check_1.png)

This checks if arg1 is equal to "starwars", and then exits if it's true.

Here's `check_2`:

![check_2](./Pics/cracker/check_2.png)

Basically checks if arg1 is equal to the reverse of "si siht egassem terces", which i "secret message this is"

Here's `check_3`:

![check_3](./Pics/cracker/check_3.png)

This runs two loops:

One, that compares the values of each element of the array `arg1` with an array iVar3 with an offset of 22.
In the second loop, the checking function gives `true` when the check is not equal. (The required boolean is `false` here).

Since the check is only for the length of the input, we can input whatever little input we want to.

So, finding the value of `chr(0x7a - 2^0x14)`, we have lowercase "l". This is the third input.

And that gives us the flag.

Original writeup (https://github.com/hegdenischay/CTF_Writeups/blob/master/cracker.md).