Tags: reverse-engineering 

Rating:

I was given a [binary](https://github.com/mar232320/ctf-writeups/raw/main/nactf/2022/tracer) to reverse-engineer

I disassembled it in gdb at first but it looked like the flag was encrypted
the binary checks the user input with fgets() and strcmp() it with the decrypted flag
I used ltace to trace the library calls. The flag wasn't visible entirely so I changed the string length parameter (-s 128) to see the full flag

# nactf{how_even_do_stream_ciphers_work_i_definitely_did_this_wrong}

Original writeup (https://github.com/mar232320/ctf-writeups/blob/main/nactf/2022/tracer.md).