Safe Opener 2
https://play.picoctf.org/playlists/10?m=75
gives us a class file
use [[Reverse Engineering#^ee5ba3]] to decompile the code
import java.io.BufferedReader;
import java.io.IOException;
import java.io.InputStreamReader;
import java.util.Base64;
import java.util.Base64.Encoder;
public class SafeOpener {
public static void main(String[] args) throws IOException {
BufferedReader keyboard = new BufferedReader(new InputStreamReader(System.in));
Encoder encoder = Base64.getEncoder();
String encodedkey = "";
String key = "";
for(int i = 0; i < 3; ++i) {
System.out.print("Enter password for the safe: ");
key = keyboard.readLine();
encodedkey = encoder.encodeToString(key.getBytes());
System.out.println(encodedkey);
boolean isOpen = openSafe(encodedkey);
if (isOpen) {
break;
}
System.out.println("You have " + (2 - i) + " attempt(s) left");
}
}
public static boolean openSafe(String password) {
String encodedkey = "picoCTF{SAf3_0p3n3rr_y0u_solv3d_it_0e57c117}";
if (password.equals(encodedkey)) {
System.out.println("Sesame open");
return true;
} else {
System.out.println("Password is incorrect\n");
return false;
}
}
}voila the flag is right there
Last updated