Home PicoCTF 2018 Reversing 400: Radix’s Terminal
Writeup
Cancel

Reversing 400: Radix’s Terminal

Challenge
Can you find the password to Radix’s login? You can also find the executable in /problems/radix-s-terminal_0_b6b476e9952f39511155a2e64fb75248?

Solution
Run strings on the binary and find the string:

1
cGljb0NURntiQXNFXzY0X2VOQ29EaU5nX2lTX0VBc1lfNDE3OTk0NTF9

The hint suggests base64 encoding, base64 decode this for the flag.

Flag

picoCTF{bAsE_64_eNCoDiNg_iS_EAsY_41799451}