RADARCTF - EasyReverse(RE 80)
The attached file is .NET Executable.
So analyze this file by using dnspy.
I found "flag()" function.
It builds two strings like flag format.
radar{flagino_flago_flago}
radar{flaginoflago}
I tried to submit both of them, and the 1st one is the flag.
flag is: radar{flagino_flago_flago}