Start the machine, hack the system, and find the hidden flags to complete this challenge and earn points!
transaction_data.json file from the challenge pagevout array in the transaction"type": "nulldata"scriptPubKeyasm field shows: OP_RETURN 6a4c4a666c61673a31653533303236302d636631302d343566362d613438312d346664336264363732616437hex field contains: 6a4c4a666c61673a31653533303236302d636631302d343566362d613438312d346664336264363732616437OP_RETURN is: 6a4c4a666c61673a31653533303236302d636631302d343566362d613438312d346664336264363732616437echo '6a4c4a666c61673a31653533303236302d636631302d343566362d613438312d346664336264363732616437' | xxd -r -ppython3 -c "import binascii; print(binascii.unhexlify('6a4c4a666c61673a31653533303236302d636631302d343566362d613438312d346664336264363732616437').decode())"jLJflag:1e530260-cf10-45f6-a481-4fd3bd672ad7jLJflag: followed by the actual flag1e530260-cf10-45f6-a481-4fd3bd672ad71e530260-cf10-45f6-a481-4fd3bd672ad7echo '6a4c4a666c61673a31653533303236302d636631302d343566362d613438312d346664336264363732616437' | xxd -r -p | sed 's/jLJflag://'1e530260-cf10-45f6-a481-4fd3bd672ad7Enter your email to continue
Choose a username to get started
We've sent a 9-character code to your email