Tags: reverse-engineering 

Rating:

## babyre
- Tags: Reverse Engineering
- Description: Just a wee-little baby re challenge.

## Solution
- To solve this question you need to download the following file. You can solve this challenge by reversing the file using Ghidra. Or you can just use "strings" and "grep" extensions and retrieve the flag.

```
strings babyre | grep "wctf"
```

```
wctf{n1c3_oNe_y0u_Found_m3}
```

Original writeup (https://github.com/archv1le/CTF-Write-Ups/blob/main/WolvCTF%202024/babyre/Solution.md).