Debrideur Fileice.net Site
$ ltrace -e crc32 ./debrideur mystery.dat ... crc32(0x0, "abcdefghij...", 0x1c0) = 0x4a1f0c2b The binary uses (the standard polynomial 0xEDB88320). The function is called on the data after the checksum field.
The checksum is calculated over the , i.e. bytes starting at 0x10 . 4. Re‑building the Bride (Checksum) 4.1 Compute the correct CRC‑32 Python makes this trivial:
| Offset | Size | Meaning | |--------|------|----------| | 0x00 | 8 | ASCII magic "DEBRIDER" | | 0x08 | 4 | (little‑endian) – the “bride” | | 0x0C | 4 | Reserved / version (currently zero) | | 0x10 | … | Payload data (to be “de‑brided”) |
FILE="$1:-mystery.dat" FIXED="$FILE.fixed" Debrideur fileice.net
def rebuild(fname): data = open(fname, "rb").read() payload = data[0x10:] # skip header + checksum field crc = binascii.crc32(payload) & 0xffffffff # rebuild the file new = data[:0x08] + crc.to_bytes(4, "little") + data[0x0c:] open(fname + ".fixed", "wb").write(new) print(f"Fixed file written: fname.fixed CRC=0xcrc:08x")
#!/usr/bin/env python3 import sys, binascii
# rebuild CRC python3 - <<PY import binascii, sys data = open("$FILE", "rb").read() crc = binascii.crc32(data[0x10:]) & 0xffffffff new = data[:0x08] + crc.to_bytes(4, 'little') + data[0x0c:] open("$FIXED", "wb").write(new) print(f"[*] Fixed CRC = 0xcrc:08x") PY $ ltrace -e crc32
./run_and_get_flag.sh mystery.dat FLAGBr1d3_1s_Just_A_CRC Congratulations! You have successfully de‑brided the file, rebuilt the missing “bride”, and uncovered the hidden flag.
def fix(fname): data = open(fname, "rb").read() payload = data[0x10:] # skip header + checksum field crc = binascii.crc32(payload) & 0xffffffff fixed = data[:0x08] + crc.to_bytes(4, "little") + data[0x0c:] out = fname + ".fixed" open(out, "wb").write(fixed) print(f"[+] Fixed file: out CRC=0xcrc:08x")
#!/usr/bin/env bash FILE=mystery.dat FIXED=$FILE.fixed The checksum is calculated over the , i
The file format is:
# 2️⃣ Execute and filter the flag ./debrideur "$FIXED" 2>/dev/null | grep -i -E 'flag\[^]+\}' Make them executable ( chmod +x rebuild.py run_and_get_flag.sh ) and you’re ready to solve the challenge in one command: