Dragon CTF 2021 Rev - `Run of the Mill` write-up
This is a write-up for Reverse engg chall -> `Run of the Mill` in DragonCTF 2021 [*]-challenges [+] (Rev - 202 pts/42 solves) Run of the Mill Our Team Water Paddler got 7 th position in `DragonCTF 2021`. Run of the Mill Given a executable, seems to be constructed directly from the assembly (Only entry0 function). Takes an input (flag), make operations on that input bytes and finally compare those input bytes with the stored 64 bytes, if equal -> prints "Well Done" Goal is to recover the flag based on operations (encryption), and final bytes. But manual analysis on those operations is very difficult (nearly 7.5k+ instructions for those operations) Analyzing the problem One of my teammate mentioned that, even though instructions are many, opcodes used are very less `['ror', 'xor', 'mov',