Appendix Writeup [Byte CTF]

wh1t3r0se
2 min readAug 26, 2020

Problem Statement!

Looks easy huh!

• First Run

So we were given a repl url running a python program. On the first run it looked like a nightmare.

Creepy ;-;

• Next Step

After seeing this I wanted to look for the source code as it might contain a flag or lead. Since I was familiar with repl, it was easy to find Anshul's [author] profile on it. From there I got this URL: -https://repl.it/@AnshulMahajan/Appendix#main.py

The Source

After seeing this it was like a shock since I have never deobfuscated a python and first thought came in mind was to deobfuscate it…

• Big Hint

The hint in the description was pointing to LOOK in the code.
So I started looking for comments and found an interesting function Inserted()

It mapped Eddington's value in the Feigenbaum dict…
fun fact Eddington
value was = “flag{}”

On retrieving values of keys f, l, a, g, {, } from the dictionary we
get a new URL
https://byteclub.in/byte_it/_frozen_importlib_external.FileFinderodict_iteratorzipcode_collections._tuplegetterkeys

So it showed a picture of a dictionary , keys, and index with a parenthesis,
so I thought about giving the index of the keys of the “flag{}” from that dictionary, voila that worked

9820793517068

• Flag

flag{N07rEvN0RcRYp70_jU57519h71N’}

Thanks for Reading
Signing off wh1t3r0se…

--

--