reverselfiles
Chall: Reversing ELF
URL: https://tryhackme.com/room/reverselfiles
Task 1: Crackme1
Solution:
chmod +x ./crackme1
Run the file:
./crackme1
and boom, we will get the flag!!
Flag: flag{not_that_kind_of_elf}
Task 2: Crackme2
Solution:
use this command in order to get strings in the program:
strings crackme2
we will see the password in the output:
super_secret_password
on running the chall, we will get the flag:
./crackme2 super_secret_password
Flag: flag{if_i_submit_this_flag_then_i_will_get_points}
Task 3: Crackme3
Solution:
use strings to get the string:
strings crackme3
we will see there is some base64 strings in the output:
ZjByX3kwdXJfNWVjMG5kX2xlNTVvbl91bmJhc2U2NF80bGxfN2gzXzdoMW5nNQ==
Decoding that string from cyberchef, we will get the flag
Flag: f0r_y0ur_5ec0nd_le55on_unbase64_4ll_7h3_7h1ng5
Task 4: Crackme4
Solution:
we have to solve it using GDB:
gdb crackme4
getting info of functions using and get the hex value for
strcmp@plt
:0x0000000000400520 strcmp@plt
make breakpoint from that value:
b *0x0000000000400520
run the program:
r aaaa
we will see the password string in
$rdi
register:my_m0r3_secur3_pwd
Flag: my_m0r3_secur3_pwd
Task 5: Crackme5
Solution:
open the file with gdb:
gdb crackme5
checked info and adding breakpoint to main:
b *main
run the program using:
r
use
ni
to check for next instruction and continue entering till it will ask for input.Write input as
test
continue
ni
and we will seeOfdlDSA|3tXb32~X3tX@sX
4tXtz`in the register section
Flag:OfdlDSA|3tXb32~X3tX@sX`4tXtz
Task 6: Crackme6
Solution:
On running the binary, it has provided hint to analyze the binary, ghidra is the best software to do so. Therefore upload file to ghidra
Analyse mysecure test function
From this function, we can clearly see the flag
Flag: 1337_pwd
Task 7: Crackme7
Solution:
Same as before, analyse main function in ghidra
In main function there is this bit of code:
So, if value is 0x7a69 (31337), it will return flag
Flag: flag{much_reversing_very_ida_wow}
Task 8: Crackme8
Solution:
Exactly as before, in ghidra analyse main function
In the code, it is showing if condition
when we run the function with that decimal it will give flag:
./crackme8 -889262067
Flag: flag{at_least_this_cafe_wont_leak_your_credit_card_numbers}
Last updated