AlpacaHack Logo

Challenges

Sign InSign Up

Rows:

CHALLENGEAUTHORS

SOLVES

(CURRENT)

SOLVE RATE

(AT CONTEST TIME)

Welcome
Misc

admin

1456

solves

-

Daily AlpacaHack

1348

solves

-

Daily AlpacaHack

772

solves

-

AlpacaHack Round 2 (Web)

588

solves

Top 28%

= 84/300 users

Daily AlpacaHack

525

solves

-

Daily AlpacaHack

505

solves

-

Daily AlpacaHack

448

solves

-

Daily AlpacaHack

347

solves

-

echo
Pwn

AlpacaHack Round 1 (Pwn)

345

solves

Top 32%

= 56/174 users

Daily AlpacaHack

344

solves

-

Daily AlpacaHack

305

solves

-

Daily AlpacaHack

304

solves

-

Daily AlpacaHack

302

solves

-

Daily AlpacaHack

291

solves

-

Daily AlpacaHack

291

solves

-

Daily AlpacaHack

287

solves

-

🐈
Web

Daily AlpacaHack

286

solves

-

Encoding Basics
Misc
Crypto

Daily AlpacaHack

285

solves

-

AlpacaHack Round 7 (Web)

266

solves

Top 15%

= 71/458 users

108
Misc

Daily AlpacaHack

265

solves

-

Rows:

read-a-binary

Daily AlpacaHack
197 solves
Rev

🦙 < Let's try reading what the ELF binary does!

Beginner Hint
  • This challenge is in the Rev (Reverse Engineering) category.
  • Flag checkers are a common theme in Rev problems.
  • A flag checker executable or script accepts player input and tells you whether it matches the flag.
  • The provided file is the ELF binary read-a-binary.
  • The goal is to find an input (the flag) that makes the binary print Correct! by analyzing the binary.
  • There are a variety of tools available that can analyze ELF binaries.
  • Some tools can show a higher level of representations than others.
read-a-binary
descriptionsolveswriteups