Problem Statement!
• First Run
So we were given a repl url running a python program. On the first run it looked like a nightmare.
• Next Step
After seeing this I wanted to look for the source code as it might contain a flag or lead. Since I was familiar with repl, it was easy to find Anshul's [author] profile on it. From there I got this URL: -https://repl.it/@AnshulMahajan/Appendix#main.py
After seeing this it was like a shock since I have never deobfuscated a python and first thought came in mind was to deobfuscate it…
• Big Hint
The hint in the description was pointing to LOOK in the code.
So I started looking for comments and found an interesting function Inserted()
It mapped Eddington's value in the Feigenbaum dict…
fun fact Eddington
value was = “flag{}”
On retrieving values of keys f, l, a, g, {, } from the dictionary we
get a new URL
https://byteclub.in/byte_it/_frozen_importlib_external.FileFinderodict_iteratorzipcode_collections._tuplegetterkeys
So it showed a picture of a dictionary , keys, and index with a parenthesis,
so I thought about giving the index of the keys of the “flag{}” from that dictionary, voila that worked
9820793517068
• Flag
flag{N07rEvN0RcRYp70_jU57519h71N’}
Thanks for Reading
Signing off wh1t3r0se…