diff --git a/space/1201-alarm/README.md b/space/1201-alarm/README.md index 03cb010..efcbc7b 100644 --- a/space/1201-alarm/README.md +++ b/space/1201-alarm/README.md @@ -115,7 +115,7 @@ print(dp(sum(BitArray(uint=w, length=15) for w in TRUE_WORDS))*16) This prints out `3.1415926931112734`, which is close enough to the `3.141592653` given in the listing for ~~government~~ ~~NASA~~ CTF work. However, the values of $1333_8$, $75_8$ we found where `PI/16` is supposed to be decode to $0.71387$: not at all what we want. Moreover, it looks like we've been visited by a haxor at these addresses. -Scanning further through core rope memory (with `V25E` to increment and repeated presses of `E` to increment further), I eventually stumbled upon two addresses which held different words every time I got a contest instance. They also happened to have magnitude similar to the original words for `PI/16`. Unfortunately, the contest is now down, and I don't remember the exact address, but the words I found right before I got the flag were $7440_8, 2122_8$; let's try decoding them! +Scanning further through core rope memory (with `V15E` to increment and repeated presses of `E` to increment further), I eventually stumbled upon two addresses which held different words every time I got a contest instance. They also happened to have magnitude similar to the original words for `PI/16`. Unfortunately, the contest is now down, and I don't remember the exact address, but the words I found right before I got the flag were $7440_8, 2122_8$; let's try decoding them! ```{.python} print(dp(sum(BitArray(uint=w, length=15) for w in [0o7440, 0o2122]))*16)