64 words
1 minutes
SCSC2026 Quals - ngestring - Reverse Engineering Writeup
Category: Reverse Engineering
Flag: SCS26{b4s1c_st4t1c_4n4lys1s_w1th_str1ngs}
Challenge Description
Given a 64-bit ELF executable named ngestring.
Analysis
The challenge name “ngestring” is a hint - it’s Indonesian slang suggesting we should use the strings command.
$ file ngestring
ngestring: ELF 64-bit LSB pie executable, x86-64, version 1 (SYSV),
dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2,
BuildID[sha1]=..., for GNU/Linux 3.2.0, not strippedSolution
Simply run the strings command to extract printable strings from the binary:
$ strings ngestring
SCS26{b4s1c_st4t1c_4n4lys1s_w1th_str1ngs} SCSC2026 Quals - ngestring - Reverse Engineering Writeup
https://blog.rei.my.id/posts/8/scsc2026-quals-ngestring-reverse-engineering-writeup/