ChallengesReverseThe Ikenga Protocol

The Ikenga Protocol

MediumPurple TeamReverse 1-2 hrs

Challenge Description / Scenario

The binary accepts a password and validates it against an encrypted blob. No source code. No symbols. Just you, a disassembler, and your wits.

Submit Flags

3 questions — answer all to complete the challenge

250 pts
1

What anti-debug technique does the binary use?

2

What is the encryption algorithm used?

3

Submit the correct password/flag.