Rating:

# The Flag Vault
![The Flag Vault](https://raw.githubusercontent.com/bsempir0x65/CTF_Writeups/main/KnightCTF_2022/img/KnightCTF_The_Flag_Vault.png)

This one was a tricky one. So after checking the event other solutions out it seems that the cool kids just us IDA and that's it. But we were clever enough to try it differently. Gimme the power Hydra .

![Ghidra](https://raw.githubusercontent.com/bsempir0x65/CTF_Writeups/main/KnightCTF_2022/img/KnightCTF_The_Flag_Vault_1.png)

We saw in the decompiler view that it seemed to be an easy check wether you have the password or not. The password is stored in local_28 we thought at least. So ghidra said that in local_28 *adacarba* is saved. Silly us is that it was meant to be read from the end to the beginning. So it should be *abracada* read. We figured that afterwards out by checking the hexview of the file. But we could not figure out why local_20 was also part of the searched string. We guessed it after the event we went back to the hexview. So we have a new entry in our bucket list

- [ ] Figure out how assembler works

So what we did was going over all the variables in the Congratulation part of the Programm and ended up with the flag *KCTF{welc0me_t0_reverse_3ngineering}*. So yeah we did not had the password but the patiences to go over each variable and check the value in it. Lucky us each variable was only one character so it did not matter which way you read out the Hex value.

Our [github](https://github.com/bsempir0x65/CTF_Writeups/tree/main/KnightCTF_2022#the-flag-vault) and [webpage](https://bsempir0x65.github.io/CTF_Writeups/KnightCTF_2022/#the-flag-vault)

Original writeup (https://github.com/bsempir0x65/CTF_Writeups/tree/main/KnightCTF_2022#the-flag-vault).