Description
Can you reverse a series of Linux text transformations to recover the original flag?
Setup
Launch the challenge instance and connect.
You'll be given an obfuscated string and a description of the transformations applied to it.
Solution
- Step 1Identify the transformationsThe challenge applies a series of Linux command-line text transformations (e.g. rev, tr, base64, xxd, rot13). Each transformation is described or can be inferred from the output format.
- Step 2Reverse the transformations in orderApply each transformation's inverse in reverse order to recover the original flag.# Example pipeline reversal:# If the transformations were: base64 → rev → tr 'a-z' 'A-Z'# Then reverse: tr 'A-Z' 'a-z' → rev → base64 -decho 'OBFUSCATED_STRING' | tr 'A-Z' 'a-z' | rev | base64 -d# Common reversals:echo 'STRING' | revecho 'STRING' | base64 -decho 'STRING' | xxd -r -pecho 'STRING' | tr 'A-Za-z' 'N-ZA-Mn-za-m' # ROT13
- Step 3Read the flagAfter applying all inverse transformations, the result should start with 'picoCTF{'.
Flag
picoCTF{und0_th3_tr4nsf0rm_...}
Apply each transformation in reverse order -- common Linux text tools like rev, tr, base64, and xxd are involved.