readFlag2

以下の問題文が与えられた。

This challenge description was given:

I have republished the previous the contract at 0x585C403bC5c7eb62BF3630c7FeF1F837603bA866, but this time no source code for you this time. Luckily, the ABI of the smart contract is the same as the previous one. Figure out how to "get()" the flag. Important: This smart contract is on Ropsten

readFlag1で開いたページのURL中のアドレスを書き換え、指定のアドレスを開いた。

I opened the specified address by modifying the address in the URL of a page I opened in the challenge readFlag1.

Contract Address 0x585C403bC5c7eb62BF3630c7FeF1F837603bA866 | Etherscan

ページ中のTransactionsのうち、ToがContact CreationになっているもののTxn Hashのリンクを開いた。

I opened the "Txn Hash" link in the "Transactions" where the "To" is "Contact Creation".

Ropsten Transaction Hash (Txhash) Details | Etherscan

Click to see More をクリックし、表示されたInput Dataの所の16進数にCyberChefで From Hex をかけると、結果にflagが含まれていた。

I clicked "Click to see More" and applied "From Hex" in CyberChef to the hexadecimal string in the "Input Data". The flag was in the result.

From Hex - CyberChef

flag{web3js_plus_ABI_equalls_flag}

PBjar CTF