PicoCTF-2021 Writeup
Search
⌃K
PicoCTF-2021 Writeup
Search
⌃K
README
Binary Exploitation
Binary Gauntlet 0
Binary Gauntlet 1
Stonks
What's your input?
Cryptography
Compress and Attack
Dachshund Attacks
Double DES
Easy Peasy
It is my Birthday 2
It's Not My Fault 1
Mini RSA
New Caesar
New Vignere
No Padding, No Problem
Pixelated
Play Nice
Scrambled: RSA
Forensics
Disk, disk, sleuth!
Disk, disk, sleuth! II
information
MacroHard WeakEdge
Matryoshka doll
Milkslap
Surfing the Waves
Trivial Flag Transfer Protocol
tunn3l v1s10n
Very very very Hidden
Weird File
Wireshark doo dooo do doo...
Wireshark twoo twooo two twoo...
Reverse Engineering
ARMssembly 0
ARMssembly 2
ARMssembly 3
ARMssembly 4
gogo
Hurry up! Wait!
keygenme-py
Let's get dynamic
Rolling My Own
Shop
speeds and feeds
Transformation
Web Exploitation
Ancient History
Bithug
GET aHEAD
It is my Birthday
More Cookies
Most Cookies
Scavenger Hunt
Some Assembly Required 1
Some Assembly Required 2
Some Assembly Required 3
Some Assembly Required 4
Super Serial
Web Gauntlet 2
Web Gauntlet 3
Who are you?
X marks the spot
Powered By GitBook

ARMssembly 4

Problem

What integer does this program print with argument 2907278761? File: chall_4.S Flag format: picoCTF{XXXXXXXX} -> (hex, lowercase, no 0x, and 32 bits. ex. 5614267 would be picoCTF{0055aabb})
  • ​Source​

Solution

  1. 1.
    This challenge can be solved using the exact same method as ARMssembly 0.

Flag

picoCTF{ad498e1c}
Reverse Engineering - Previous
ARMssembly 3
Next - Reverse Engineering
gogo
Last modified 9mo ago
Copy link
Edit on GitHub
On this page
Problem
Solution
Flag