Search for a command to run...

Okay! Fixed last time's issue. Seriously though, I swear this one is unbreakable.
file plastic-shield-2/plastic-shield-2
strings -n 4 plastic-shield-2/plastic-shield-2 | head -n 200
Findings:
.rodata.crypto_blake2b, AES ECB/CBC, etc.objdump -d plastic-shield-2/plastic-shield-2 | sed -n '180,260p'
Flow in main:
crypto_blake2b(password) β sprintf("%02x", ...) loop builds a hex digest buffer.hex_to_bytes to form AES key/IV.Nibble handling shows only the first two bytes of AES key and IV vary, derived from the tail of the hex digest. Effective search space:
key[0] == iv[0] in 0..255key[1] == iv[1] in {0,16,32,...,240}.rodata):e2ea0d318af80079fb56db5674ca8c274c5fd0e92019acd01e89171bb889f6b1
scriptCTF{.python3 -m pip install --user pycryptodome
python3 plastic-shield-2/solve.py
Matching bytes: key0==iv0=254, key1==iv1=240.
scriptCTF{00p513_n07_4641n!}