,

IOLI crackme0x03

https://github.com/Maijin/radare2-workshop-2015/tree/master/IOLI-crackme/bin-linux


Check the file.


Test the program out.


Analyze the program in GDB.

crackme0x03x is very similar to crackme0x02x but has a test function built instead of compare.

There are two ways to find the password.

  • The lines inside the orange box can be equated to give us an answer.
  • Set a breakpoint at the test function and print out the variable for [ebp-0xc]

Disassemble the test function

Run a breakpoint to find out the value of the strings.

Looks like its encrypted strings and just an obfuscation for the challenge.


Test the password

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Comments (

0

)

%d bloggers like this: