The Ikenga Protocol
MediumPurple TeamReverse 1-2 hrs
Challenge Description / Scenario
The binary accepts a password and validates it against an encrypted blob. No source code. No symbols. Just you, a disassembler, and your wits.
Submit Flags
3 questions — answer all to complete the challenge
250 pts
1
What anti-debug technique does the binary use?
2
What is the encryption algorithm used?
3
Submit the correct password/flag.