Tags: xor crypto reverse engineering 

Rating: 5.0

after few static analysis i found that we can get back the original data by running the file "flag.enc" through the encryption process 3 times then you get the flag

./dark flag.enc flag1.enc
./dark flag1.enc flag2.enc
./dark flag2.enc flag3.enc

flag3.enc -> PDF file

#xor #easy_hunt