Posted by kablaa October, 2016
Flame PPC-150 Handcrafted pyc Reversing-50

Flame (PPC-150)

This was my first encounter with Power PC, so this challenge was definitely fun learning experience for me. Here is my best attempt at the decompiled source code.
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
int global_values[] = {0xCFE,0x859,0x95D,0x871,0x40D,6,0xADE,0xFA8,0x561,0x9DA, \
    0x878,0x682,0xFA9,0xF5F,0x25E,0xDB0,0xFBF,0xBC6,0xD38,0x95D,0xD09,0x7ED,0x307, \
int main(){
    char input[35];
    int *checked_against = global_values;
    int i;
    //print welcome string
    if(strlen(input) == 35){
        for(i = 0; i < 35;  i++){
            int random = rand();
            char y = input[i]^clrlwi(random);
            input[i]= y;
        for(i=0; i< 35; i++){
            if(input[i] != checked_against[i]){
                goto FAIL;
        printf("Good job!! now you can submit your flag :)");
        return 0;
    printf("Your flag is incorrect :(");
    return 0;
There is a global array containing values that are checked against user input. I'm not sure what the C equivalent of clrlwi is, but what that instruction does is clear out the most significant bits of of its argument. So clrlwi(0xdeadbeef) would return 0x000000eef. Because rand is seeded by 7777, I can just reproduce this to get the random values that will be xord with user input. Here is my Get_Rands.c
#include <stdio.h>
#include <stdlib.h>

int main(int argc, const char *argv[])
    int i;
    for (i = 0; i < 35; i++) {
       int random = rand();
       printf("%8x\n",random) ;
    return 0;
After getting these values, I just manually cleared out the most significant bits. Here is my decrypt.py
A = [0xCFE,0x859,0x95D,0x871,0x40D,6,0xADE,0xFA8,0x561,0x9DA,0x878,0x682,0xFA9,

B = [0xc96,0x830,0x929,0x812,0x462,0x068,0xaa5,0xff8,0x551,0x98d,0x84b,0x6f0,0xff9,

flag = ""
for i in range(0,35):
    flag += chr(A[i]^B[i])
print flag

Handcrafted pyc (Reversing-50)

We were given a python file for this challege
#!/usr/bin/env python
# -*- coding: utf-8 -*-

import marshal, zlib, base64

After looking at the decompressed data, I realized that the header had been removed, so I compiled a pyc file and got the correct header. Here is my Get_Bytecodes.py
#!/usr/bin/env python
# -*- coding: utf-8 -*-

import marshal, zlib, base64

x = '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'

y = base64.b64decode(x)
z= zlib.decompress(y)
f = open('dump.pyc','wb')
data = header + z
I then ran uncompyle2 ,which did not work completely due to some errors with ROT_2. However, I was able to get the python bye codes
0    LOAD_GLOBAL       'chr'
3   LOAD_CONST        108
6   CALL_FUNCTION_1   None
9   LOAD_GLOBAL       'chr'
12  LOAD_CONST        108
15  CALL_FUNCTION_1   None
18  LOAD_GLOBAL       'chr'
21  LOAD_CONST        97
24  CALL_FUNCTION_1   None
27  LOAD_GLOBAL       'chr'
30  LOAD_CONST        67
33  CALL_FUNCTION_1   None
36  ROT_TWO           None
37  BINARY_ADD        None
38  ROT_TWO           None
39  BINARY_ADD        None
40  ROT_TWO           None
41  BINARY_ADD        None
I noticed that there wew a bunch of characters being loaded. I figured I would see what they are.
uncompyle2 dump.pyc > broken
and here is my fix.py
def isInt(s):
        return True
    except ValueError:
        return False

f = open('broken','rb')
data = f.read()
data = data.split('\n')
result = ""
for d in data:
    s=d.split(' ')
    x = s[len(s)-1]
    if(isInt(x) == True):
        result = result + chr(int(x))
print result
which gave me the flag..only it was all scrambled up.
llaC em yP aht notriv lauhcamni !eac Ini npreterP tohty ntybdocese!!!
ctihN{noy woc uoc naipmoa eldnur yP nnohttyb doceni euoy rb ria}!
napwssro :dorWp gnssadrow...elP  esa yrtaga .ni oD tonurbf etecro)= .$
After some good old fashion trial and error, we were able to get the flag
hitcon{Now you can compile and run Python bytecode in your brain!}