Previous Level Guide: ASCII Everywhere
CC Strings
Name: CC Strings Description: We know this program has the flag, but he won't talk! Type: Forensics Challenge from: RSAC picoCTF 2025 Files: chall Hints: 1. Now CyberChef has a "Strings" function! 2. The flag is 23 characters long
Theory
According to the description, to get the flag we have to make a compiled program talk or something like that, it really doesn't give any info at all, so let's take a quick look at the hints. So it seems we need to use strings, a command to see all the human readable characters of a binary file, then pipe it to grep which we'll use to find the usual format of the flag:
~$ strings chall | grep "picoCTF{"
Solution
So first of all, we'll download the file and give it executing permission, I wanna test something:
shukularuni-picoctf@webshell:~$ wget https://rsac-picoctf-files.picoctf.net/c_rsac_challenges/9bed09c066682468c60d448cc29baace87710bfa3f8c5879bdd33ad1b711e769/chall --2025-05-19 18:01:29-- https://rsac-picoctf-files.picoctf.net/c_rsac_challenges/9bed09c066682468c60d448cc29baace87710bfa3f8c5879bdd33ad1b711e769/chall Resolving rsac-picoctf-files.picoctf.net (rsac-picoctf-files.picoctf.net)... 3.160.22.87, 3.160.22.54, 3.160.22.19, ... Connecting to rsac-picoctf-files.picoctf.net (rsac-picoctf-files.picoctf.net)|3.160.22.87|:443... connected. HTTP request sent, awaiting response... 200 OK Length: 16000 (16K) [application/octet-stream] Saving to: 'chall' chall 100%[=================================================================================================================================================================>] 15.62K --.-KB/s in 0s 2025-05-19 18:01:29 (263 MB/s) - 'chall' saved [16000/16000] shukularuni-picoctf@webshell:~$ chmod +x chall
Before doing anything else, let's see what happens if we execute it just usually:
shukularuni-picoctf@webshell:~$ ./chall I will never reveal my secrets!
Okay, so if they don't want to cooperate, then we'll have to use the strings command to search for the flag then:
shukularuni-picoctf@webshell:~$ strings chall | grep "picoCTF{" picoCTF{41w4y5_57r1n95}
There we go! That's the flag.
Next Level Guide: COLOR-CRYPTO-KEYS
https://rsac.picoctf.org/level/2/4