AlpacaHack Logo

Challenges

Sign InSign Up

Rows:

CHALLENGEAUTHORS

SOLVES

(CURRENT)

SOLVE RATE

(AT CONTEST TIME)

Welcome
Misc

admin

1351

solves

-

Daily AlpacaHack

996

solves

-

Daily AlpacaHack

625

solves

-

AlpacaHack Round 2 (Web)

544

solves

Top 28%

= 84/300 users

Daily AlpacaHack

441

solves

-

Daily AlpacaHack

414

solves

-

Daily AlpacaHack

375

solves

-

echo
Pwn

AlpacaHack Round 1 (Pwn)

328

solves

Top 32%

= 56/174 users

Daily AlpacaHack

282

solves

-

Daily AlpacaHack

261

solves

-

Daily AlpacaHack

259

solves

-

AlpacaHack Round 7 (Web)

258

solves

Top 15%

= 71/458 users

Daily AlpacaHack

258

solves

-

Daily AlpacaHack

253

solves

-

Daily AlpacaHack

251

solves

-

Daily AlpacaHack

244

solves

-

qrime
Crypto

AlpacaHack Round 3 (Crypto)

243

solves

Top 38%

= 91/239 users

Daily AlpacaHack

239

solves

-

Daily AlpacaHack

232

solves

-

Daily AlpacaHack

222

solves

-

Rows:

Leaked Flag Checker

Daily AlpacaHack
414 solves
Rev

Author:

flag checker everyone loves

Beginner Hint
  • This challenge is in the Rev (Reverse Engineering) category.
  • Flag checkers are a common theme in Rev problems.
  • A flag checker executable or script accepts player input and tells you whether it matches the flag.
  • The provided files are the C source challenge.c and its Ubuntu 24.04 binary build challenge.
  • In challenge.c, the flag-related string xor_flag has been edited out and hidden.
  • The goal is to use challenge.c as a reference and find an input (the flag) that makes the challenge binary print Correct.
  • Typically Rev problems don't include source code. You usually analyze only the binary. This one can also be solved without the source.
leaked-flag-checker.tar.gz
descriptionsolveswriteups