Medium Live

CTF 6502

40 points

89 Solves

Reverse Engineering

heinandre ctflearn++ badge

Community Rating: 4.42 / 5

Headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.

Welcome to the CTF 6502 challenge!

In this CTF challenge, the MOS 6502 has returned. This time it doesn't power a home video game console or computer system like the Nintendo Entertainment System or the Commodore 64.

This time it's hiding our flag! Let's travel back in time to the beginning of the home computer revolution, whip out our programming manual and get our hands dirty with some good old 6502-assembly.

Implement the missing opcode in the OPCODE_0x49-method and fix the machine code in the program-variable.

When you're done you should be able to read the flag in the memory dump at memory address 0x0040.

Good luck, I'll see you in the future!

(The Program.cs-file is attached. Run it any way you prefer. Or use .NET Fiddle to run it in your browser here: https://dotnetfiddle.net/VDGK8P)

First 10 Solvers

Rank Username
1 Ntoskrnl
2 0mr1
3 PleSo ctflearn++ badge
4 Exolon
5 bobo1239

Comments

    • Londek

      Protected 0.0

      [REDACTED] This comment is only shown to users who have solved this challenge.

    • Rivit

      Protected 0.0

      [REDACTED] This comment is only shown to users who have solved this challenge.

      • SquidBoy

        Protected 0.0

        [REDACTED] This comment is only shown to users who have solved this challenge.

    • Caillou

      0.0

      Nice one. Learnt something new

    • intelagent moderator badge ctflearn++ badge

      Protected 0.0

      [REDACTED] This comment is only shown to users who have solved this challenge.