AlpacaHack Logo

Challenges

Sign InSign Up

Rows:

CHALLENGEAUTHORS

SOLVES

(CURRENT)

SOLVE RATE

(AT CONTEST TIME)

AlpacaHack 2100
Misc

Daily AlpacaHack

admin

1650

solves

-

1546

solves

-

Daily AlpacaHack

884

solves

-

AlpacaHack Round 2 (Web)

612

solves

Top 28%

= 84/300 users

Daily AlpacaHack

597

solves

-

Daily AlpacaHack

571

solves

-

SECCON Beginners CTF 2024

510

solves

Top 73%

= 683/928 teams

Daily AlpacaHack

393

solves

-

Daily AlpacaHack

388

solves

-

echo
Pwn

AlpacaHack Round 1 (Pwn)

357

solves

Top 32%

= 56/174 users

Daily AlpacaHack

356

solves

-

Daily AlpacaHack

347

solves

-

Daily AlpacaHack

332

solves

-

Daily AlpacaHack

328

solves

-

Daily AlpacaHack

320

solves

-

Encoding Basics
Misc
Crypto

Daily AlpacaHack

320

solves

-

Daily AlpacaHack

315

solves

-

🐈
Web

Daily AlpacaHack

313

solves

-

Bars
Web

Daily AlpacaHack

302

solves

-

108
Misc

Daily AlpacaHack

296

solves

-

Rows:

Leaked Flag Checker

Daily AlpacaHack
571 solves
Rev

Author:

flag checker everyone loves

Beginner Hint
  • This challenge is in the Rev (Reverse Engineering) category.
  • Flag checkers are a common theme in Rev problems.
  • A flag checker executable or script accepts player input and tells you whether it matches the flag.
  • The provided files are the C source challenge.c and its Ubuntu 24.04 binary build challenge.
  • In challenge.c, the flag-related string xor_flag has been edited out and hidden.
  • The goal is to use challenge.c as a reference and find an input (the flag) that makes the challenge binary print Correct.
  • Typically Rev problems don't include source code. You usually analyze only the binary. This one can also be solved without the source.
leaked-flag-checker.tar.gz
descriptionsolveswriteups