Advent Of CyberSecurity 2
Task 22 : [Day 17] Reverse Engineering ReverseELFneering
Let us ssh into the target and see what we’ve got.
we have 2 binaries here, file1
is just for the tutorial , we will be looking at challenge1
Let us analyse it with radare2
We used aaa
to analyze the binary and we can see the list of functions using afl
. We find that sym.main
function is present. So we decompile it
What is the value of local_ch when its corresponding movl instruction is called (first if multiple)?
1
mov dword [local_ch], 1
instruction moves 1 into the local_ch variable
What is the value of eax when the imull instruction is called?
6
mov dword [local_8h], 6
moves 6 into local_8h and imul eax, dword [local_8h]
multiplies previous value of 1 and local_8h (1 x 6) and stores it into eax
What is the value of local_4h before eax is set to 0?
6
mov dword [local_4h], eax
stores value of eax (6) into local_4h
Task 23 : [Day 18] Reverse Engineering The Bits of Christmas
I’ll use Remmina
to connect to target using RDP
if you do not have it already , you can install it as ,
sudo apt install remmina
enter the target ip and then username password provided
Now open the TBFC app, try to enter any password… and unless you somehow guessed the right password you must get this dialog box
Now lets look at what is going behind the scenes in this application.
Fire up the IL Spy app and open the TBFC_APP in it
Crackme
section sticks out of many items in the app
We can find the password logic if explore around a bit. I found the password check logic in the MainForm
Here we find the value of the flag, also there seems to be a string named santapassword
let us check that out by double clicking
we get a hexadecimal constant which translates to santapassword321
which infact is our password
nice stuff