64 words
1 minutes
SCSC2026 Quals - ngestring - Reverse Engineering Writeup

Category: Reverse Engineering
Flag: SCS26{b4s1c_st4t1c_4n4lys1s_w1th_str1ngs}

Challenge Description#

Given a 64-bit ELF executable named ngestring.

Analysis#

The challenge name “ngestring” is a hint - it’s Indonesian slang suggesting we should use the strings command.

$ file ngestring
ngestring: ELF 64-bit LSB pie executable, x86-64, version 1 (SYSV), 
dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, 
BuildID[sha1]=..., for GNU/Linux 3.2.0, not stripped

Solution#

Simply run the strings command to extract printable strings from the binary:

$ strings ngestring
SCS26{b4s1c_st4t1c_4n4lys1s_w1th_str1ngs}
SCSC2026 Quals - ngestring - Reverse Engineering Writeup
https://blog.rei.my.id/posts/8/scsc2026-quals-ngestring-reverse-engineering-writeup/
Author
Reidho Satria
Published at
2026-02-17
License
CC BY-NC-SA 4.0