Recently Updated
Reversing 400: Radix’s Terminal
Challenge
Can you find the password to Radix’s login? You can also find the executable in /problems/radix-s-terminal_0_b6b476e9952f39511155a2e64fb75248?
Solution
Run strings on the binary and find the string:
1
cGljb0NURntiQXNFXzY0X2VOQ29EaU5nX2lTX0VBc1lfNDE3OTk0NTF9
The hint suggests base64 encoding, base64 decode this for the flag.
Flag
picoCTF{bAsE_64_eNCoDiNg_iS_EAsY_41799451}