WolvCTF 2025 — LockDown
15 de abril de 2025 · 3030 palavras · 15 minutos · CTF Reversing Hardware
It has been a few weeks since we played WolvCTF 2025, but I’ve been longing to write about LockDown, a simple but fun hardware reverse engineering challenge. The problem statement follows: I’m trying to use this adder, but I can’t figure out what password gets it to work. Can you figure it out? NOTE: to get the flag, convert the password bit-string into an ASCII string, with password[47] as the MSB and password[0] as the LSB.