Difficulty: Easy
Concepts: Python, code obfuscation
Tools: Python
About
The Easy GZ challenge introduces gzip compressed data commonly encountered in malware samples and reverse engineering challenges. At first glance, the file may appear unreadable or uninteresting, but decompression reveals hidden content worth analyzing. This writeup explains how gzip compression works and how beginners can safely extract and analyze compressed files during reverse engineering.
Walkthrough
Take a look at the script and understand what it is doing when it gets executed. First it will decompress a gzip compressed byte string then convert the output into a bytes object and execute it.
Solving this challenge is very simple, all it takes is changing the exec into a print. Run the script after you make that change and that will reveal the hidden code. Inside the code you extracted you will find the flag. Enter it on The Range to complete this challenge.
