You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: 2025-wwctf/rev/Flagchecker.md
+7-2Lines changed: 7 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,11 +5,12 @@ description: AI flag checker (hard)
5
5
---
6
6
7
7
## post mortem
8
+
8
9
Yay! non-zero solves!
9
10
10
11
The one thing I messed up was the final score, because the original challenge was not linear layers, it was a CNN which was much smaller in size, and is also more accurate.
11
12
12
-
However my intended solution of generating a image just by passing a `1050*51` image over and over to get the flag didn't work. I should've just tried to solve it with other algorithms like the other player did, which actually uses the font data, but it was late in the night and also approaching the tart of the CTF, so I just made a new model that is fully linear, hopefully making the adversarial attack easier.
13
+
However my intended solution of generating a image just by passing a `1050*51` image over and over to get the flag didn't work. I should've just tried to solve it with other algorithms like the other player did, which actually uses the font data, but it was late in the night and also approaching the start of the CTF, so I just made a new model that is fully linear, hopefully making the adversarial attack easier.
13
14
14
15
But I still messed up the font rendering part, this caused the glyphs to not match the training code, this caused the score to be low (~0.1). I couldn't figure out the solution in time, so I just lowered the required score to pass the password check.
Do a beam search by iteratively scoring rendered candidate flags.
607
610
608
611
### greedy (@grok)
612
+
609
613
I tried using grok to solve the challenge after `upx -d --lzma`, it managed to solve everything basically.
610
614
611
615
> This is the decompiled code of a CTF challenge, it accepts a 50 char flag and checks it. It is a 50MB binary but this is most of the code already, there aren't that much code in the binary. Please read the code carefully, figure out what it is doing, and help me solve for the flag. If there are assets to extract, tell me their names and addresses.
0 commit comments