diff --git a/self-modifier/b0.bin b/self-modifier/b0.bin index 3014467..ac4e313 100644 Binary files a/self-modifier/b0.bin and b/self-modifier/b0.bin differ diff --git a/self-modifier/b1.bin b/self-modifier/b1.bin index 21c4f15..f56c1fc 100644 Binary files a/self-modifier/b1.bin and b/self-modifier/b1.bin differ diff --git a/self-modifier/description.md b/self-modifier/description.md index bb9b86f..e51f2df 100644 --- a/self-modifier/description.md +++ b/self-modifier/description.md @@ -1,2 +1,5 @@ Welcome to the RE training course, this problem has 4 phases. Solve all four to get the flag. + +Note: On phase 1 round to 6 significant figures. + [Download](${morpher_exe}) \ No newline at end of file diff --git a/self-modifier/first.asm b/self-modifier/first.asm index b3f2be6..c6185f7 100644 --- a/self-modifier/first.asm +++ b/self-modifier/first.asm @@ -128,7 +128,7 @@ past_trash: retn b_val dd 0x4039999a -base_txt db 'Please enter the best number', ENDL, 0 +base_txt db 'Please enter the best number, round to 6 significant figures.', ENDL, 0 a_val dd 0x40d00000 scanf_txt db '%f', 0 final_val dd 0xc092e6a0 diff --git a/self-modifier/first.bin b/self-modifier/first.bin index 990c9b1..09c6b3c 100644 Binary files a/self-modifier/first.bin and b/self-modifier/first.bin differ diff --git a/self-modifier/flag_genner.py b/self-modifier/flag_genner.py new file mode 100644 index 0000000..b1ae190 --- /dev/null +++ b/self-modifier/flag_genner.py @@ -0,0 +1,12 @@ +# Generates random flag thing +import random + +flag_temp = '{%s}' + +def gen_flag(len): + val = '' + for x in range(len): + val += random.choice(list('abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789')) + return flag_temp % val + +print(gen_flag((4*3)-2)) \ No newline at end of file diff --git a/self-modifier/morpher.exe b/self-modifier/morpher.exe index 2eaddea..473fe0a 100644 Binary files a/self-modifier/morpher.exe and b/self-modifier/morpher.exe differ