Rating: 5.0

bin01 (500 pts) (Crypto)

We intercepted this file in Wireshark. Can you decrypt it? 

Given: a data file named bin01 

Examining the file, we see quite a lot of 0x90 bytes.

hexdump -C bin01:

00000000  ef d5 dc d6 92 91 91 90  90 90 90 90 90 90 90 90  |................|
00000010  93 90 ae 90 91 90 90 90  d0 95 90 90 90 90 90 90  |................|
00000020  d0 90 90 90 90 90 90 90  a0 89 90 90 90 90 90 90  |................|
00000030  90 90 90 90 d0 90 a8 90  99 90 d0 90 8d 90 8c 90  |................|
00000040  96 90 90 90 94 90 90 90  d0 90 90 90 90 90 90 90  |................|
00000050  d0 90 90 90 90 90 90 90  d0 90 90 90 90 90 90 90  |................|
00000060  68 91 90 90 90 90 90 90  68 91 90 90 90 90 90 90  |h.......h.......|

This made us suspect that the file had been XOR:ed with 0x90. XOR:ing the file with 0x90 gave us an ELF executable. For some reason it segfaulted when we ran it, but looking at the content with string revealed a suspicious-looking string (QlRIX0NURnsweFhPUi0weEVuY29kZWQtMHhiaW5hcnl9) which turned out to be the flag encoded in base64.

BTH_CTF{0xXOR-0xEncoded-0xbinary}

Original writeup (https://github.com/liuhack/writeups/blob/master/2019/BTH_CTF/bin01/README.md).