Rating:

## Forensics/Forenscript

It's thundering outside and you are you at your desk having solved 4 forensics challenges so far. Just pray to god you solve this one. You might want to know that sometimes too much curiosity hides the flag.

with open("a.bin", "rb") as data:
with open("recovered", "ab") as output:
while data:
bytes = data.read(4)
if bytes == b'':
break
print(bytes[::-1])
output.write(bytes[::-1])

`file a.bin`

![image](https://github.com/zer00d4y/writeups/assets/128820441/819a8af7-65b2-4847-adc1-574826f2ef94)

file recovered

![image](https://github.com/zer00d4y/writeups/assets/128820441/2c069615-df27-44c3-8344-e13286b71659)

binwalk -e recovered

![image](https://github.com/zer00d4y/writeups/assets/128820441/ee8b23f5-fbf8-4a38-aee3-4c6525514fe9)

![image](https://github.com/zer00d4y/writeups/assets/128820441/40b8ee79-9772-413c-be00-bba7576c10f5)

![image](https://github.com/zer00d4y/writeups/assets/128820441/9d50d90f-7876-4515-a8ae-cb8ca1aafec4)

![image](https://github.com/zer00d4y/writeups/assets/128820441/4a8e08bd-6b74-4207-bd16-7e9190a75901)

FLAG: `flag{scr1pt1ng_r34lly_t0ugh_a4n't_1t??}`

Original writeup (https://github.com/zer00d4y/writeups/blob/main/CTF%20events/BackdoorCTF/BackdoorCTF_2023.md).