Kategorilerpwn.collageReverse

Reverse Challenge-3 Writeup

Actually Challenge is not different than previous challenge.

Firstly, I examine the main function.

I find a string value that I predict license key.

I type a license key but it is not working and I back to source code. I realize the comment.

I change the letter in 0 and 2 indexes

Finally it is working.

Kategorilerpwn.collageReverse

Reverse Challenge-2 Writeup

I analysis the binary with ghidra.

When I see the symboll tree I find a local_variable. Actually my purpose is that I see the main function and find a main function.

I find function that run the library and change the name as main. Sorry for the screen shot I ss after change its name.

When I see main function. The most attention thing is that usage memcmp.

memcmp compares two memories according to the value you give. For more information

https://www.tutorialspoint.com/c_standard_library/c_function_memcmp.htm

I see the memory “eqbdc” and when I type the keyword. It is working. 😀

Kategorilerpwn.collageReverse

Reverse Challenge-1 Writeup

I start the new challenge that is related reverse engineering. Moreover I continue to add many writeup about other topics.
Let’s start to talk about first challenge.

I try to solve challenges that I mention the first paragraph. I try to talk about first challenge.

I start the machine and run the binary.

First Run

It specifies that expect result 75 6d 6e 75 64

So I convert the value to ASCII.

Convert to ASCII

And I type the ASCII value after I run the binary. It runs successfully

Last Debug
Finally