Tag: Reverse Engineering
-
picoCTF 2022 | unpackme Write-up
Can you get the flag? Reverse engineer this binary. Category: Reverse Engineering First, from reading the hint, I tried to look up UPX => it’s an executable packer. Understanding what this is is not entirely needed to overcome the challenge, the important thing is I’ll have to install upx to unpack the provided executable. After…
-
picoCTF 2022 | Bbbbloat Write-up
Can you get the flag? Reverse engineer this binary. Category: Reverse Engineering To solve this challenge, I used ghidra, a popular tool for reverse-engineering. I opened up a new project, imported the provided executable, and started looking for the main function. Of particular interest is this: The program asks you for a number, and if…
-
picoCTF 2022 | Fresh Java Write-up
Can you get the flag? Reverse engineer this Java program. Category: Reverse Engineering As the challenge suggested, I threw the provided program at an online Java decomplier. I used this one. You can make out the flag by looking at each character the program checks for, from the bottom up. The re-assembled flag reads: picoCTF{700l1ng_r3qu1r3d_84e23997}
-
picoCTF 2022 | bloat.py Write-up
Can you get the flag? Run this Python program in the same directory as this encrypted flag. Category: Reverse Engineering Our first step after downloading the files will be to look through the python program. The code here is purposefully written to be confusing for the reader, with the aim of obfuscating the program’s true…
-
picoCTF 2022 | unpackme.py Write-up
Can you get the flag? Reverse engineer this Python program. Category: Reverse Engineering Since this is a reverse engineering problem, let’s start by looking at the code for this python program. We can see a payload (seemingly encoded in base64), which will be decrypted using the key_str variable, itself encoded in base64.After this, the decoded…
-
picoCTF 2022 | Safe Opener Write-up
Can you open this safe? I forgot the key to my safe but this program is supposed to help me with retrieving the lost key. Can you help me unlock my safe? Put the password you recover into the picoCTF flag format like: picoCTF{password} Category: Reverse Engineering The challenge provided us with a program, let’s…
-
picoCTF 2022 | patchme.py Write-up
Can you get the flag? Run this Python program in the same directory as this encrypted flag. Category: Reverse Engineering First thing first, let’s download the two provided files. I used wget for this. Attempting to run the python script will prompt us for a password, which we don’t yet have. Instead, let’s look into…