Thursday, May 30, 2013

Third Puzzle on 0x41414141.com

After solving the second challenge, we got an email reply with the following contents.

sweet.

Here's the C source:

int bar(){
    int x = 0xC0FFEE;
    return (x ^ (int)bar) ^ 0x8744EE;
}

int main(){
    int x = 0;
    x = bar("Email is return value of fn in form 0x12345678 zero padded to eight digits");
}

Now here's something a little different:

0x41414141.com/gzip/

good luck!
Visiting the above url, i saw this image.


For this particular puzzle, i've used Cerbero Profiler.
Loading the image into Cerbero Profiler, i'm been informed by Profiler that "1 chunks don't match their CRC. They are highlighted in the format view."
That particular chunk is zTXT and if we read the PNG specifications, it is been compressed.

Cerbero Profiler comes along with many features. Let's do a quick filter on the chunk that we are interested in by selected the hex bytes as shown below.


After that, add the zlib unpack filter to it and press preview and you should see something like the image below.


The returned results is "pngRocks@challenge.0x41414141.com" and that is the email address which we should send to. :D

But for people who are interested in an open-source solution, i've written a small python code here to do that.
pyDeflate.py

cheers
0x4a61636f62

No comments:

Post a Comment