Category: Hacking
-
Configuring API Hacking Lab
crAPI mkdir lab cd lab curl -o docker-compose.yml https://raw.githubusercontent.com/OWASP/crAPI/main/deploy/docker/docker-compose.yml mv docker-compose.yml crapi cd crapi sudo docker-compose pull sudo docker-compose -f docker-compose.yml –compatibility up -d http://127.0.0.1:8888 http://127.0.0.1:8025/ vapi git clone http://github.com/roottusk/vapi.git cd vapi sudo docker-compose up -d http://127.0.0.1/vapi sudo docker-compose ps
-
Demystify reverse engineering
https://drive.google.com/file/d/1oTERzqyVPbK8TImkkZyWsrnPfRNGYygN/view Determine the file type Use the file command to determine the file type Test the program Strings Use strings to print the sequences of printable characters in files Analyze Dissemble the program Use IDA Pro to analyze the program main function: The password is hardcoded The strcmp function is called to test the input…
-
HTB Challenge : Impossible Password
https://app.hackthebox.com/challenges/impossible-password Download the file and test out the program. Use strings for clues. Try with the found password. Use ltrace to observe the file. The program compares with a random string and exits. We see that the program holds the time , srand and malloc functions. The string comparison randomly changes by time. Disassemble Let’s…
-
NoraCodes crackme01
https://github.com/NoraCodes/crackmes Test out the program Use ltrace Use strings Test out the password.
-
picoCTF : crackme-py
Download the python file and examine the code. The flag is encrypted Encrypted flag is stored in line 4 lines 3 and 9 shows that the cipher used is ROT47 Use cyberchef to get the flag.
-
HTB Challenge : Baby RE
https://app.hackthebox.com/challenges/baby-re Test the program. Use Ghidra to analyze the program. Key can also be located via strings command. Test the key
-
picoCTF : asm1
The source gives us a text file that contains Assembly code. The argument given is 0x6fa = 1786 To get the flag subtract 0x12 from 0x6fa.
-
IOLI crackme0x03
https://github.com/Maijin/radare2-workshop-2015/tree/master/IOLI-crackme/bin-linux Check the file. Test the program out. Analyze the program in GDB. crackme0x03x is very similar to crackme0x02x but has a test function built instead of compare. There are two ways to find the password. The lines inside the orange box can be equated to give us an answer. Set a breakpoint at the…
-
picoCTF : GDB Test Drive
Run GDB and set the layout. Set a breakpoint at call function sleep@plt jump to the variable [rbp-0x30] to find the flag.
-
IOLI crackme0x00
https://github.com/Maijin/radare2-workshop-2015/tree/master/IOLI-crackme/bin-linux Check the file. Test out the program. Use the strings command. Password can be obtained in plaintext. Check the program
-
IOLI crackme0x02
https://github.com/Maijin/radare2-workshop-2015/tree/master/IOLI-crackme/bin-linux Check the file. Test the program out. Analyze the program in GDB. There are two ways to find the password. The lines inside the orange box can be equated to give us an answer. Set a breakpoint at the cmp line and print out the variable for [ebp-0xc] We can also analyze the program…
-
IOLI crackme0x01
https://github.com/Maijin/radare2-workshop-2015/tree/master/IOLI-crackme/bin-linux Check the file. Test the program out. Analyze the program in Ghidra. Assembly: Decompile: Password is hard coded = 0x149a = 5274 User Input is compared with password Test the password
-
HTB Buff
https://app.hackthebox.com/machines/Buff Use nmap to find for open ports. Webserver shows a fitness based company. In the contact page we can find the interface used for the site. Searchsploit gives us some options. Download the file. Access gained. To get a better shell upload nc.exe via a python server. Run netcat and start a listener on…
-
picoCTF : Bbbbloat
Test out the program. Start up Ghidra and analyze the file. Flag is hard coded in the program.