Tags: xor crypto reverse engineering
Rating: 5.0
after few static analysis i found that we can get back the original data by running the file "flag.enc" through the encryption process 3 times then you get the flag
./dark flag.enc flag1.enc
./dark flag1.enc flag2.enc
./dark flag2.enc flag3.enc
flag3.enc -> PDF file
#xor #easy_hunt