Tags: reversing 

Rating:

# Cheesy

We're given a program we need to find the flag in it. Intuition tells me to run `strings` on it. When we do, we run into this:

![](https://raw.githubusercontent.com/shawnduong/ctf-writeups/master/2019-TAMU/images/Cheesy-1.png)

```
Hello! I bet you are looking for the flag..
I really like basic encoding.. can you tell what kind I used??
RkxBR2ZsYWdGTEFHZmxhZ0ZMQUdmbGFn
Q2FuIHlvdSByZWNvZ25pemUgYmFzZTY0Pz8=
Z2lnZW17M2E1eV9SM3YzcjUxTjYhfQ==
WW91IGp1c3QgbWlzc2VkIHRoZSBmbGFn
```

Looks like it's just some basic base64. We can decode them directly through the command line.

```
$ echo <BASE64STRING> | base64 -d
```

The flag is the third string.

![](https://raw.githubusercontent.com/shawnduong/ctf-writeups/master/2019-TAMU/images/Cheesy-2.png)

Original writeup (https://github.com/shawnduong/ctf-writeups/blob/master/2019-TAMU/Reversing/Cheesy.md).