Background
As usual, let’s download the theballoon
file and see what it is.
It’s said it’s defalted balloon(Compressed data), spin it around
, _inflate_ it
. Then, I saw a string that’s rotated, and it reminds me Cicada 3301 stuff, as it looks a HTTPS scheme
. Hmm… Let’s use CyberChef to rotate that string. I’ll use Rot13
recipe and manually change the amount
.
Oh… It’s a pastebin link. Let’s check that out.
Weird string… Let’s throw that into CyberChef again with the Raw Inflate
recipe, as the theballoon
file tells us to inflate it(Decompress).
And voila!! That’s the flag!