Crcrcr (rebyC, Hard, 406 pts)

Author: Egor Zaytsev (@groke)

I created a simple service that encrypts flag (and your data) with RC4! I bet you can't the extract flag from there :)

Source code: crcrcr.tar.gz

Hint at 20:00 — When I wanna know how Python objects are stored in memory, I can do:

>>> s = b"qweqweqweqwe";
terminal2: gcore `pidof python3`

And then look at resulting core file, get xref to qweqweqeqwe, and try to find out how Python objects are stored in memory.

And I guess I will be happy to find cipher.S (rc4 state) in the coredump