10
2
Fork 0

1201 alarm: fix typo

This commit is contained in:
Erin Moon 2020-06-03 15:32:01 -05:00
parent 57bb2eb1b8
commit d0e2af222c
1 changed files with 1 additions and 1 deletions

View File

@ -115,7 +115,7 @@ print(dp(sum(BitArray(uint=w, length=15) for w in TRUE_WORDS))*16)
This prints out `3.1415926931112734`, which is close enough to the `3.141592653` given in the listing for ~~government~~ ~~NASA~~ CTF work.
However, the values of $1333_8$, $75_8$ we found where `PI/16` is supposed to be decode to $0.71387$: not at all what we want. Moreover, it looks like we've been visited by a haxor at these addresses.
Scanning further through core rope memory (with `V25E` to increment and repeated presses of `E` to increment further), I eventually stumbled upon two addresses which held different words every time I got a contest instance. They also happened to have magnitude similar to the original words for `PI/16`. Unfortunately, the contest is now down, and I don't remember the exact address, but the words I found right before I got the flag were $7440_8, 2122_8$; let's try decoding them!
Scanning further through core rope memory (with `V15E` to increment and repeated presses of `E` to increment further), I eventually stumbled upon two addresses which held different words every time I got a contest instance. They also happened to have magnitude similar to the original words for `PI/16`. Unfortunately, the contest is now down, and I don't remember the exact address, but the words I found right before I got the flag were $7440_8, 2122_8$; let's try decoding them!
```{.python}
print(dp(sum(BitArray(uint=w, length=15) for w in [0o7440, 0o2122]))*16)