Tags: reverse engineering 

Rating:

Hidden in plain sight - Rev - 45 points

Log in to the shell and run the file with GDB

Dissasemble the main function with "disas main"

In the mainfunction there are alot of "mov 0xXX -> %al".
Translated the first 3 hex codes to ascii and saw "Ice" so just copy all the hex and translate it to ascii
and the flag is there.

flag : IceCTF{look_mom_I_found_it}

Original writeup (https://github.com/Idomin/CTF-Writeups/blob/master/IceCTF/HiddenInPlainSight-Rev-45).