From d0e2af222c7cc3073b8910b61910c0308d3cb6f8 Mon Sep 17 00:00:00 2001 From: Erin Moon Date: Wed, 3 Jun 2020 15:32:01 -0500 Subject: [PATCH] 1201 alarm: fix typo --- space/1201-alarm/README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/space/1201-alarm/README.md b/space/1201-alarm/README.md index 03cb010..efcbc7b 100644 --- a/space/1201-alarm/README.md +++ b/space/1201-alarm/README.md @@ -115,7 +115,7 @@ print(dp(sum(BitArray(uint=w, length=15) for w in TRUE_WORDS))*16) This prints out `3.1415926931112734`, which is close enough to the `3.141592653` given in the listing for ~~government~~ ~~NASA~~ CTF work. However, the values of $1333_8$, $75_8$ we found where `PI/16` is supposed to be decode to $0.71387$: not at all what we want. Moreover, it looks like we've been visited by a haxor at these addresses. -Scanning further through core rope memory (with `V25E` to increment and repeated presses of `E` to increment further), I eventually stumbled upon two addresses which held different words every time I got a contest instance. They also happened to have magnitude similar to the original words for `PI/16`. Unfortunately, the contest is now down, and I don't remember the exact address, but the words I found right before I got the flag were $7440_8, 2122_8$; let's try decoding them! +Scanning further through core rope memory (with `V15E` to increment and repeated presses of `E` to increment further), I eventually stumbled upon two addresses which held different words every time I got a contest instance. They also happened to have magnitude similar to the original words for `PI/16`. Unfortunately, the contest is now down, and I don't remember the exact address, but the words I found right before I got the flag were $7440_8, 2122_8$; let's try decoding them! ```{.python} print(dp(sum(BitArray(uint=w, length=15) for w in [0o7440, 0o2122]))*16)