Official Fishy HTTP Discussion

Official discussion thread for Fishy HTTP. Please do not post any spoilers or big hints.

I set up the same and proper webserver. Eventually, the program executes following command

dir && cd \Users\pakcyberbot && echo 'you are hacked' > notes.txt

Any idea? My Discord is @sarpthebolt

Don’t trust tools such Detect It Easy. I wasted so much time because of this.

Once you decompile the binary, it’s not that hard to get flag.

I am sure there are easier ways to solve this than how I did it, but for anyone coming here looking for a hint here are the tools I used: a windows debugger, a webserver, wireshark, awk / text editor, and an online decoder.

If the above is too much of a hint please let me know.

I got both the parts but for some reason flag is not correct
part1: HTB}*****_******_***
part2: ****_********_********}

I tried few combinations but they didn’t work.

I know I have the flag, yet it is still wrong. I did both parts in order to get the flag. Pretty obvious the flag is right considering the phrase. If it is capital sensitive, still did not work. How do I submit this flag or is it a challenge in itself.

There’s a chance there’s something in between the two flags parts I have rn but I’m not convinced just yet.

I am back, it was the case sensitivity lmaoooo

It’s way past the release so I don’t know if I’ll get a response, but was it my de-compiler that interpreted code wrong, or did everyone else need to slightly adjust the DecodeData function in order to get things to decode correctly?