Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- # uncompyle6 version 3.3.5
- # Python bytecode 3.7 (3394)
- # Decompiled from: Python 2.7.16 (default, Apr 6 2019, 01:42:57)
- # [GCC 8.3.0]
- # Embedded file name: client.py
- # Size of source mod 2**32: 1449 bytes
- checked2 = [
- 9887454823508319666176L, 288172475648682933383442546271715328L, 142788163609707759784588649053552640L, 167644010141872405086208L, 2367687367491881398609906326124363776L, 15370263527767281493147526365184L, 9636902969440640078552601187032498176L, 4776913109852041418248056622882488320L]
- checked1 = [65536, 123904, 118784, 123904, 99328, 113664]
- checked0 = [65612, 123953, 118859, 123955]
- checked4 = [122, 59, 99, 107, 105, 122, 75]
- user_input = input('Masukan Serial key: ')
- mentah_data = user_input.split('#')
- def _print(data):
- print(data)
- exit(0)
- if len(mentah_data) != 4:
- _print('Hallo? who are you?')
- if len(mentah_data[1]) != len(checked1):
- _print('Sorry Who are')
- if len(mentah_data[0]) != len(checked2):
- _print('Ha? Halo')
- if len(mentah_data[2]) != len(checked0):
- _print('Hallo??')
- if len(mentah_data[3]) != len(checked4):
- _print('HEYYY!! YOU ARE WRONG!')
- for c1 in range(len(mentah_data[0])):
- if ord(mentah_data[0][c1]) << ord(mentah_data[0][c1]) != checked2[c1]:
- _print('NO!')
- for c2 in range(len(checked1)):
- if ord(mentah_data[1][c2]) << 10 != checked1[c2]:
- _print('No!')
- for c3 in range(len(mentah_data[2])):
- if ord(mentah_data[2][c3]) + checked1[c3] != checked0[c3]:
- _print('Noooo!')
- for c4 in range(len(mentah_data[3])):
- if ord(mentah_data[3][::-1][c4]) ^ len(checked2) != checked4[c4]:
- _print('Big NO!')
- print("Here's your Flag: CTFSHL2019{" + user_input.replace('#', '_') + '}')
- # okay decompiling client.pyc
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement