CyberSCI CTF Write-up: Water Treatment (Part 1)
I recently tackled the Water Treatment reverse engineering challenge from the CyberSCI Regionals 2025-26. The challenge involves a legacy 16-bit MS-DOS executable (wt.exe) and consists of three flags. I managed to solve the first flag during the hackathon and the second one afterwards. This post details how I cracked the password to get the “Access Granted” message. Here is how I went from raw assembly to a successful crack using Ghidra and Python. ...