Rating:

# Full WriteUp
Full Writeup on our website: [http://www.aperikube.fr/docs/xiomara_2018_re4/](http://www.aperikube.fr/docs/xiomara_2018_re4/)

-----

# TL;DR
The binary is a 64 bits ELF executable. After having disassembled the program with IDA I saw that the code is decrypting itself. Each character of the flag is a key which serves to decrypt the next block of code. Deciphering the code with a debugger can be very tedious. So I wrote a script with r2pipe to decrypt each block of code.

Original writeup (http://www.aperikube.fr/docs/xiomara_2018_re4/).