Taming a Weird Snake - PicoCTF Walkthrough
Lavafroth
Oh look at you! Your friend left a cryptic file at your desk and wants you tame some weird snake langauge? Don't fret, today I'll walk you through the process of reading, inferring from and reverse engineering python bytecode using a rather simple challenge from PicoCTF.
Credits: Challenge file generously provided by CMU PicoCTF x86_64 Instruction Set Reference: https://www.felixcloutier.com/x86/ Octicons: https://primer.github.io/octicons Iterator icon: https://svgrepo.com Backing Track "Forever" by Whitesand is under a Creative Commons license: https://www.youtube.com/watch?v=LXJcwn_rfqM
Further reading: Forbidden names in listcomp: https://stackoverflow.com/questions/60809021/why-does-python-use-0-to-represent-an-iterator-in-disassembled-byte-code Dis manual: https://docs.python.org/3/library/dis.html
Thumbnail timelapse on second channel: https://youtu.be/07BbqBv91cI
Code used to render animations: https://github.com/lavafroth/videos ... https://www.youtube.com/watch?v=DvtUAX5OZ18
71925532 Bytes