From 4ff011a5654009e0871dbf9e93274b3366a5ce8b Mon Sep 17 00:00:00 2001 From: simon Date: Tue, 5 Sep 2023 11:28:39 +0200 Subject: [PATCH] Update DownUnderCTF 2023/beginner/pyny/README.md --- DownUnderCTF 2023/beginner/pyny/README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/DownUnderCTF 2023/beginner/pyny/README.md b/DownUnderCTF 2023/beginner/pyny/README.md index 306a3c18..7c05b14f 100644 --- a/DownUnderCTF 2023/beginner/pyny/README.md +++ b/DownUnderCTF 2023/beginner/pyny/README.md @@ -13,7 +13,7 @@ def _(): pass You probably want to do some easy stuff, like.. "decoding", and sure you can do that apparently. Well I'm different, and went for the debugger route. Sadly the debugger shipped with Pycharm and VSCode seems to be incapable of running this punycode. -So if a python is based on C and the python debugger is not an option, what do you do? Correct, you step through the literal python elf with gdb. Set a breakpoint at several Functions that might compare memory and get ready to cramp from the constant Enter Spam in order to continue through that binary. At Some point you will get the flag, but that can be optimised. +So if python is based on C and the python debugger is not an option, what do you do? Correct, you step through the literal python elf with gdb. Set a breakpoint at several Functions that might compare memory and get ready to cramp from the constant Enter Spam in order to continue through that binary. At Some point you will get the flag, but that can be optimised. Luckily some guy called Juan Cespedes, might have had a similar problem and decided to do something: