Help: Reverse Engineering 03-31-2020, 11:42 AM
#1
Within this Github repository there is a simple C program that performs an XOR encryption on a string with an arbitrary key. Given is hex-encoded bytestream as the result of its use: https://gitlab.com/op8-recruitment/op8-c...bytestream
The decoded answer is a plain-text alphanumeric string as is the key. The aim is to decode the encoded string within the below code into plaintext and submit the key along with the decoded plaintext:
I am wondering if anyone can help me out in figuring the answer to the right key and string.
Thanks.
The decoded answer is a plain-text alphanumeric string as is the key. The aim is to decode the encoded string within the below code into plaintext and submit the key along with the decoded plaintext:
Code:
Usage: ./encode "<key>" "<string>"
0x16 0x1a 0x10 0x6c 0x0f 0x02
I am wondering if anyone can help me out in figuring the answer to the right key and string.
Thanks.
(This post was last modified: 03-31-2020, 11:45 AM by Dean Winchester.)
![[Image: JchOGM.png]](http://imageshack.com/a/img923/2406/JchOGM.png)