notes (463B)
1fuck this challenge, no interesting concepts, only tricky details 2 3look into zsh source, sind out that RANDOM uses C srand / rand 4 5srand is called on zsh init with epoch sec+usec seed 6 7we can guess the seed, filter using known values and do trial decryptions 8to find the right one 9 10tricky detail: subshell does not modify the rand state of the parent shell 11so in the encoded piece generation the random value does not change.. 12haha that did not cost me my sanity