Tags: misc 

Rating: 4.5

# Treasure

## Problem

![task](./src/task.png)

[file](./src/treasure)

## Solution

Let's see what's inside the file:

![file](./src/file.png)

It might be a bit unclear, but all this text is just a base64. So we can decode this and get a new file.

![new_file](./src/new_file.png)

Looking into the new file didn't give me any hints about what is is, so I passed it to `binwalk`.

![binwalk](./src/binwalk.png)

Ha, it's a game for GameBoy. I've download emulator and ran this.

![flag](./src/flag.png)

The tasks says that passcode is under the flag, so it's 58DPY. Wrap it in flag format and here it is: b00t2root{58DPY}

Original writeup (https://github.com/0awawa0/CTF-Writeups/tree/master/b00t2root%202019/MISC/Treasure).