Skip to main content

Reversing ELF

 Tryhackme - Reversing ELF


 

Crackme1  

Run the program

chmod 777 crackme1

./crackme1


 

#1 :- What is the flag?

Answer :- flag{not_that_kind_of_elf} 

Crackme2

chmod 777 crackme2

./crackme2 

strings crackme2


#2 :- What is the super secret password ?

Answer :- super_secret_password

#3 :- What is the flag ?

Answer :- flag{if_i_submit_this_flag_then_i_will_get_points} 

Crackme3 

chmod 777 crackme3

./crackme3

strings crackme3

 


 base64 decode 

echo "ZjByX3kwdXJfNWVjMG5kX2xlNTVvbl91bmJhc2U2NF80bGxfN2gzXzdoMW5nNQ==" | base64 -d

                                                         
f0r_y0ur_5ec0nd_le55on_unbase64_4ll_7h3_7h1ng5 

#4 :- What is the flag?

Answer :- f0r_y0ur_5ec0nd_le55on_unbase64_4ll_7h3_7h1ng5 

Crackme4 

chmod 777 crackme4

./crackme3

Let’s debug,

r2 -d ./crackme4 

Analyze the program

aaa 

lists functions

afl

there's is mainfunction 

pdf @main

This looks like comparing function.

 pdf @main

 

Here’s the string compare.

Set breakpoint

pdf @sym.compare_pwd

 

Let’s check the value

#5 :- What is the password ?

Answer :- my_m0r3_secur3_pwd

crackme5 

chmod 777 crackme5

./crackme5

strings crackme5


 

let's debug,

r2 -d ./crackme5

analysis 

aaa

list function

afl 

pdf @main



There’s string compare.

dc

pdf @main


Let’s get value of rsi.

px @rsi


#6 :- What is the input ?

Answer :- OfdlDSA|3tXb32~X3tX@sX`4tXtz

Crackme6 

 ./crackme6

strings crackme6

check debug,

r2 -d ./crackme6

analysis 

aaa

list function

afl


there are main function,

pdf @main


There’s another function.

I think this is comparing character function.

then, convert to hex to text converter,

 

 

#7 :- What is the password ?

Answer :- 1337_pwd 

Crackme7  

./crackme7

strings crackme7


lets check debug

pdf @main



Looking more closely, there’s comparing function.


hexa to decimal converter,



 


 success!


 

#8 :-What is the flag ?

Answer :-flag{much_reversing_very_ida_wow}

Crackme8 

./crackme8

strings crackme8

let's check debug,

r2 -d ./crackme8

pdf @main


There’s cmp here with “0xcafef00d”. Before that there’s atoi function.


 

Input numbers decimal and signed 2 complement.

 
 
 


#9 :- What is the flag ? 

Answer :- flag{at_least_this_cafe_wont_leak_your_credit_card_numbers}

 

 

 

 

Comments

Popular posts from this blog

Windows Fundamentals 2

 TryHackMe - Windows Fundamentals 2 Task 1 Introduction  #1 :- Read above and start the virtual machine.  Answer :- No Answer Needed Task 2 System Configuration   #2.1 :- What is the name of the service that lists Systems Internals as the manufacturer?  Answer :- PsShutdown #2.2 :- Whom is the Windows license registered to? Answer :- Windows User #2.3 :- What is the command for Windows Troubleshooting? Answer :- C:\Windows\System32\control.exe /name Microsoft.Troubleshooting #2.4 :- What command will open the Control Panel? (The answer is  the name of .exe, not the full path) Answer :- control.exe Task 3 Change UAC Settings  #3 :- What is the command to open User Account Control Settings? (The answer is the name of the .exe file, not the full path)  Answer :- UserAccountControlSettings.exe Task 4 Computer Management  #4.1 :- What is the command to open Computer Management? (The answer is the name of the .msc file, not the full

Windows Fundamentals 3

 Tryhackme - Windows Fundamentals 3   Task-1 Introduction  #1:- Read the above and start the virtual machine.  Answer:- No Answer Needed Task-2 Windows Updates  #2:- There were two definition updates installed in the attached VM. On what date were these updates installed?  Answer:- 5/3/2021 Task-3 Windows Security  #3:- In the above image, which area needs immediate attention?  Answer:- virus & threat protection Task-4 Virus & threat protection  #4:- Specifically, what is turned off that Windows is notifying you to turn on?  Answer:- Real-time protection Task-5 Firewall & network protection  #5:- If you were connected to airport Wi-Fi, what most likely will be the active firewall profile?  Answer:- public network Task-6 App & browser control  #6:- Read the above.  Answer:- No Answer Needed Task-7 Device security  #7:- What is the TPM?  Answer:- Trusted Platform Module Task-8 BitLocker #8:- What must a user insert on computers that DO NOT have a TPM version 1.2 or la

Linux Fundamentals Part 1

TryHackMe - Linux FundamentalsPart 1  #1 :- Research: What year was the first release of a Linux operating system?  Answer :-1991  #2 :- if we wanted to output the text "TryHackMe", what would our command be?  Answer :-echo TryHackMe  #3 :- What is the username of who you're logged in as on your deployed Linux machine? Answer :-tryhackme #4 :- On the Linux machine that you deploy, how many folders are there?    Answer :-2 #5 :- Which directory contains a file?  Answer :-folder4 #6 :- What is the contents of this file? Answer :-Hello World #7 :- Use the cd command to navigate to this file and find out the new current working directory. What is the path? An