AlpacaHack Logo

Challenges

Sign InSign Up

Rows:

CHALLENGEAUTHORS

SOLVES

(CURRENT)

SOLVE RATE

(AT CONTEST TIME)

Welcome
Misc

admin

858

solves

-

AlpacaHack Round 2 (Web)

366

solves

Top 28%

= 84/300 users

echo
Pwn

AlpacaHack Round 1 (Pwn)

240

solves

Top 32%

= 56/174 users

qrime
Crypto

AlpacaHack Round 3 (Crypto)

177

solves

Top 38%

= 91/239 users

AlpacaHack Round 7 (Web)

172

solves

Top 15%

= 71/458 users

CakeCTF 2023

148

solves

Top 33%

= 246/729 teams

AlpacaHack Round 6 (Pwn)

138

solves

Top 28%

= 57/197 users

AlpacaHack Round 8 (Rev)

112

solves

Top 19%

= 61/316 users

RTACTF 2023 Spring

107

solves

-

AlpacaHack Round 6 (Pwn)

104

solves

Top 20%

= 41/197 users

AlpacaHack Round 4 (Rev)

91

solves

Top 15%

= 42/279 users

AlpacaHack Round 3 (Crypto)

87

solves

Top 17%

= 42/239 users

AlpacaHack Round 1 (Pwn)

86

solves

Top 15%

= 27/174 users

AlpacaHack Round 7 (Web)

83

solves

Top 9%

= 42/458 users

CaaS
Web

AlpacaHack Round 2 (Web)

63

solves

Top 4%

= 13/300 users

AlpacaHack Round 3 (Crypto)

59

solves

Top 12%

= 30/239 users

AlpacaHack Round 2 (Web)

58

solves

Top 3%

= 10/300 users

XOR-CBC
Crypto

RTACTF 2023 Spring

57

solves

-

AlpacaHack Round 10 (Pwn)

57

solves

Top 42%

= 40/95 users

RTACTF 2023 Spring

56

solves

-

Rows:

Flag Printer

SECCON CTF 13 決勝観戦CTF
44 solves
Rev

Author:

フラグを出力するアセンブリです🤖

f(char*):
        push    rbp
        mov     rbp, rsp
        mov     QWORD PTR [rbp-24], rdi
        mov     DWORD PTR [rbp-4], 0
        jmp     .L2
.L4:
        mov     eax, DWORD PTR [rbp-4]
        movsx   rdx, eax
        mov     rax, QWORD PTR [rbp-24]
        add     rax, rdx
        movzx   eax, BYTE PTR [rax]
        cmp     al, 64
        jle     .L3
        mov     eax, DWORD PTR [rbp-4]
        movsx   rdx, eax
        mov     rax, QWORD PTR [rbp-24]
        add     rax, rdx
        movzx   eax, BYTE PTR [rax]
        cmp     al, 90
        jg      .L3
        mov     eax, DWORD PTR [rbp-4]
        movsx   rdx, eax
        mov     rax, QWORD PTR [rbp-24]
        add     rax, rdx
        movzx   eax, BYTE PTR [rax]
        movsx   eax, al
        lea     edx, [rax-65]
        mov     eax, DWORD PTR [rbp-4]
        add     eax, 13
        add     eax, edx
        movsx   rdx, eax
        imul    rdx, rdx, 1321528399
        shr     rdx, 32
        sar     edx, 3
        mov     ecx, eax
        sar     ecx, 31
        sub     edx, ecx
        imul    ecx, edx, 26
        sub     eax, ecx
        mov     edx, eax
        mov     eax, edx
        lea     ecx, [rax+65]
        mov     eax, DWORD PTR [rbp-4]
        movsx   rdx, eax
        mov     rax, QWORD PTR [rbp-24]
        add     rax, rdx
        mov     edx, ecx
        mov     BYTE PTR [rax], dl
.L3:
        add     DWORD PTR [rbp-4], 1
.L2:
        mov     eax, DWORD PTR [rbp-4]
        movsx   rdx, eax
        mov     rax, QWORD PTR [rbp-24]
        add     rax, rdx
        movzx   eax, BYTE PTR [rax]
        test    al, al
        jne     .L4
        nop
        nop
        pop     rbp
        ret
.LC0:
        .string "Alpaca{%s}\n"
main:
        push    rbp
        mov     rbp, rsp
        sub     rsp, 16
        mov     DWORD PTR [rbp-7], 1197424961
        mov     DWORD PTR [rbp-4], 4672071
        lea     rax, [rbp-7]
        mov     rdi, rax
        call    f(char*)
        lea     rax, [rbp-7]
        mov     rsi, rax
        mov     edi, OFFSET FLAT:.LC0
        mov     eax, 0
        call    printf
        mov     eax, 0
        leave
        ret
descriptionsolveswriteups