[CTF Series #1] The Reverse Engineering Challengeby@GhouLSec
13,060 reads
13,060 reads

[CTF Series #1] The Reverse Engineering Challenge

by GhouL3mSeptember 7th, 2020
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow
EN

Too Long; Didn't Read

The Reverse Engineering Challenge is the first ever written up on a reverse engineering challenge. The challenge aims to get the flag from the binary (ELF) file. It has a check and goodboy function that looks suspicious that will need further investigation on it. The code snippet on the left is the check function. It was very obvious that the value of eax register will compare with the value in the [local_8h] also known as ebp-0x08h to continue with its process. If the compared value is not the same, it will goes to badboy function in which the program will terminated.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail

Coin Mentioned

Mention Thumbnail
featured image - [CTF Series #1] The Reverse Engineering Challenge
GhouL HackerNoon profile picture
GhouL

GhouL

@GhouLSec

Originate from medium @cyjien

About @GhouLSec
LEARN MORE ABOUT @GHOULSEC'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

GhouL HackerNoon profile picture
GhouL@GhouLSec
Originate from medium @cyjien

TOPICS

Languages

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite