#
 
After downloading the file, let's use the "file" command to find out the type of the file.
 
 
The file output says unknown. We can use “strings” or “xxd” to check strings.
 
When we check the hex value of the ELF file on the internet, we see that there is an error in the hex value.
 
 
I found these values on the internet.
 
Let's fix it via Hex Editor.
 
 
After editing, let's give the “x” permissions to run the file.
 
 
 
When we run the file, it asks us for a password.
 
Let's launch the open source reverse engineering and analysis tool called radare2 (r2).
 
 

aaa (Analyze All)

afl (Analyze Funcs)

s main (switch main)

pdf (Print Disassemble Funcs)

We obtain the password
 
 
flag:THM{[REDACTED]}