Can-CWIC CTF 2017 rev me easy writeup
    hi there     in this article i'll tell you how i solved the rev me easy    challenge in can-cwic ctf 2017,so let's go     first the challenge look like the image below           after downloading the file    Let’s take a look at the binary in IDA                so as we saw it is pretty simple    it is just move group of values one by one to edx then xor it with the value in eax    now what is the value in eax    let's scroll up a little bit and we found it it is 0x10           so after i collect all the values that been mov to edx and xored    in order to solve the challenge i wrote a python script that do    the same operation the app do and print the result  wish supposed to   be the flag   cc =  ""  bb =  [] aa =  [ 0x56 , 0x5c , 0x51 , 0x57 , 0x6b , 0x42 , 0x23 , 0x66 , 0x75 , 0x62 , 0x63 , 0x79 , 0x7e , 0x77 , 0x4f ,  0x79 , 0x25 , 0x4f , 0x7e , 0x20 , 0x64 , 0x4f , 0x64 , 0x78 , 0x71 , 0x64 , 0x4f , 0x78 , 0x71 , 0x6...