,

Demystify reverse engineering

https://drive.google.com/file/d/1oTERzqyVPbK8TImkkZyWsrnPfRNGYygN/view


Determine the file type

Use the file command to determine the file type


Test the program


Strings

Use strings to print the sequences of printable characters in files


Analyze

Dissemble the program

Use IDA Pro to analyze the program

main function:

  • The password is hardcoded
  • The strcmp function is called to test the input
  • Test instruction is done
  • If jump non zero is executed it calls the print_flag function.

Let’s analyze the print_flag function:

  • This function prints the flag characters in a loop

Test the program

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Comments (

0

)

%d bloggers like this: