Description
A compiled SafeOpener.class supposedly reveals the forgotten safe code. Either strings analysis or Java decompilation uncovers the embedded flag.
Download SafeOpener.class and inspect it with strings or a Java decompiler such as jd-gui.
Extract the Java source to locate the hard-coded password and picoCTF flag.
wget https://artifacts.picoctf.net/c/290/SafeOpener.class
strings SafeOpener.class | grep pico
sudo apt install jd-gui && jd-gui SafeOpener.class
Solution
- Step 1Use strings for a quick winThe compiled class embeds the flag literally. Running strings (or cat if you convert to .java) reveals picoCTF{...} near the bottom.
- Step 2Optional: DecompileOpen the class in jd-gui to view SafeOpener.java. The flag appears in the clear, and you can save the decompiled file for reference.cat SafeOpener.java | grep pico | cut -d "\" -f1
Flag
picoCTF{SAf3_0p3...8a993}
No dynamic execution is required; the challenge is purely static analysis.