Skip to content

Commit 522bf50

Browse files
committed
Update 44-echo-double-combat.md
1 parent b2790de commit 522bf50

1 file changed

Lines changed: 2 additions & 9 deletions

File tree

website/writeups/FinalTrace_2025/44-echo-double-combat.md

Lines changed: 2 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -66,9 +66,7 @@ for (int i = 0; i < 9; i++) {
6666
key[i] = key_enc[i] ^ 0x55;
6767
}
6868

69-
// Read input and compare
7069
if (memcmp(input, key, 9) == 0) {
71-
// Decrypt flag with repeating-key XOR
7270
for (int i = 0; i < 18; i++) {
7371
flag[i] = flag_enc[i] ^ key[i % 9];
7472
}
@@ -110,13 +108,7 @@ cys{s3cr3t_1s_un10cked}
110108
### solver python code
111109
the code could change for new binary file as hex dump locations might change
112110

113-
114-
#!/usr/bin/env python3
115-
"""
116-
Solver for the Echo-Double Challenge
117-
Based on the decompiled code analysis
118-
"""
119-
111+
```python
120112
def extract_data_from_binary(filename='l'):
121113
"""Extract data from the binary file"""
122114
try:
@@ -318,3 +310,4 @@ def main():
318310

319311
if __name__ == "__main__":
320312
main()
313+
```

0 commit comments

Comments
 (0)