In the debug application, there are some python code
Imp = b'Use the same carefully'MyValue = b'a*)h\x1f/!U9&\x1f\x1cz\x19\x038\r%/?\x15)\x10\x1d\t\x15A\\\nt&S8:L2%7\tW\x1dZ54\x14\t#U8\r?b70PX'adefenc(MyValue): bytevalue =bytearray()for i inrange(len(MyValue)): bytevalue.append(MyValue[i] ^ Imp[i %len(Imp)])returnbytes(bytevalue)value =enc(MyValue.encode())print(value)Flag 2: Telemetry check-in confirmed.
The code defines a function called enc() that performs performs an XOR operation between each byte in MyValue and the corresponding byte in the Imp byte string.
The result of this operation is then appended to a new byte array called bytevalue. Finally, the enc() function returns the contents of bytevalue as a byte string.
Modifying the code to print out the decoded text, which is a key for azure function.
Imp = b'Use the same carefully'MyValue = b'a*)h\x1f/!U9&\x1f\x1cz\x19\x038\r%/?\x15)\x10\x1d\t\x15A\\\nt&S8:L2%7\tW\x1dZ54\x14\t#U8\r?b70PX'defenc(MyValue): bytevalue =bytearray()for i inrange(len(MyValue)): bytevalue.append(MyValue[i] ^ Imp[i %len(Imp)])returnbytes(bytevalue)value =enc(MyValue)print(value.decode())
I then manually visited all 3 function with the function key to see if it works, and the Blanket App allow me to retrieve the flag.