cscg24-adventure

CSCG 2024 Challenge 'Choose Your Own Adventure'
git clone https://git.sinitax.com/sinitax/cscg24-adventure
Log | Files | Refs | sfeed.txt

notes (463B)


      1fuck this challenge, no interesting concepts, only tricky details
      2
      3look into zsh source, sind out that RANDOM uses C srand / rand
      4
      5srand is called on zsh init with epoch sec+usec seed
      6
      7we can guess the seed, filter using known values and do trial decryptions
      8to find the right one
      9
     10tricky detail: subshell does not modify the rand state of the parent shell
     11so in the encoded piece generation the random value does not change..
     12haha that did not cost me my sanity