Skip to content

Commit

Permalink
🧑‍🤝‍🧑 Removed the duplicate authors
Browse files Browse the repository at this point in the history
Authors are already specified in the metadatas
  • Loading branch information
Kalitsune committed Apr 7, 2024
1 parent e790c4c commit 1361a29
Show file tree
Hide file tree
Showing 2 changed files with 3 additions and 7 deletions.
6 changes: 2 additions & 4 deletions posts/FCSCFibonacci.md
Original file line number Diff line number Diff line change
Expand Up @@ -56,16 +56,14 @@ MOV R0,R3
STP
```

which gives us the machine code :
which gives us the machine code :

```
800600014dad80010000800200018006000180040000CF004a53002100324dad0645C701CFF900301400
```

which gives us the flag :
which gives us the flag :

```
FCSC{770ac04f9f113284eeee2da655eba34af09a12dba789c19020f5fd4eff1b1907}
```

by cartoone
4 changes: 1 addition & 3 deletions posts/KnightCTFHello.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
published: true
title: KnightCTF - Hello
description: Our solution for the "Hello" challenge of the KnightCTF 2023
author: Cartoone
author: Cartoone and Kalitsune
date: '01/22/2023'
icon: https://ctftime.org/media/cache/34/9f/349fe0a23f72ce7efeca1cf6e9eed649.png
tags:
Expand All @@ -24,5 +24,3 @@ Decoding this string, which is obviously in base 64, gives us :
We can see that this string is encrypted with a substitution algorithm, as the structure seems correct. We look for the beginning of the key (we're told in the statement that the flag is coded in **vigenère**) as we know that the flag begins with KCTF we obtain KNIG we deduce that the key was KNIGHT and we obtain the flag:

```KCTF{h1_th3n_wh0_ar3_y0u}```

Solved by cartoone and maple

0 comments on commit 1361a29

Please sign in to comment.