We recovered some data. It was labeled as RSA, but what in the world are "dq" and "dp"? Can you decrypt the ciphertext for us?
Turns out, some of the files back from Master Challenge 1 were corrupted. Restore this one file and find the flag.
Someone got hacked! Check out some service's password hashes that were leaked at hashdump.txt! Do you think they chose strong passwords? We should check... The service is running at shell2017.picoctf.com:61096!
Today we're going to attack another reverse engineering challenge from Behemoth series, to improve our knowledge in reverse engineering.
In this post we're going to work on a short, but still great machine from Vulnhub called Pluck. Let's start!