Category: Hacking
-
picoCTF : Bbbbloat
Test out the program. Start up Ghidra and analyze the file. Flag is hard coded in the program.
-
picoCTF : Tab, Tab, Attack
Use the tab command to scroll through the files faster till reach a ELF and the flag will be found.
-
My Reverse Engineering notes
Instructions Explanation db Define bytes (expressions) CALL Call a function ADD Perform an addition SUB Perform a subtraction CMP Compares two numeric data fields JNZ Jump non zero Reverse engineering my own programs To start learning assembly and reverse engineering I decided to make my own simple C programs and observe the program flow through…
-
Reverse Engineering – 0x01
Download the challenge : here Tools used : Test out the program Use gdb to disassemble Set to intel syntax and disassemble the main function. Let’s use ghidra to color code and analyze the assembly code. Let’s head back to gdb and crack the program. Set a breakpoint in the main function. A breakpoint is…
-
Reverse Engineering : 7
https://crackmes.one/crackme/60318a0a33c5d42c3d016b5d Test the program. Analyze the file in Ghidra Password is hard coded function will compare the hard coded password with the user input
-
HTB Challenge : Behind the Scenes
https://app.hackthebox.com/challenges/behind-the-scenes
-
picoCTF : Static ain’t always noise
Flag can be obtained easily from the strings command.
-

HTB Networked
https://app.hackthebox.com/machines/Networked Run a nmap scan to find for open ports. Homepage doesn’t show much. Run a gobuster scan to find for directories. A place to upload files. Backup folder with a zipped file. Download and unzip the backup folder to get some php source codes. Upload.php shows a check file function. lib.php shows a file_mime_type…
-
HTB Challenge : WIDE
https://app.hackthebox.com/challenges/wide Start up Ghidra to find for clues. In the menu function we find the password hardcoded. Flag is found
-
picoCTF : vault-door-training
Flag can be obtained easily from reading the java source code.



