[CTF Series #1] The Reverse Engineering Challengeby@GhouLSec
7,314 reads

[CTF Series #1] The Reverse Engineering Challenge

tldt arrow
EN
Read on Terminal Reader🖨️

Too Long; Didn't Read

The Reverse Engineering Challenge is the first ever written up on a reverse engineering challenge. The challenge aims to get the flag from the binary (ELF) file. It has a check and goodboy function that looks suspicious that will need further investigation on it. The code snippet on the left is the check function. It was very obvious that the value of eax register will compare with the value in the [local_8h] also known as ebp-0x08h to continue with its process. If the compared value is not the same, it will goes to badboy function in which the program will terminated.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail

Coin Mentioned

Mention Thumbnail
featured image - [CTF Series #1] The Reverse Engineering Challenge
GhouL HackerNoon profile picture

@GhouLSec

GhouL

About @GhouLSec
LEARN MORE ABOUT @GHOULSEC'S EXPERTISE AND PLACE ON THE INTERNET.
react to story with heart

RELATED STORIES

L O A D I N G
. . . comments & more!
Hackernoon hq - po box 2206, edwards, colorado 81632, usa