Ramada
10 points Easy

This is a beginners Reversing Challenge. It is build with the optimization level set to 0 so that the assembler is more readable. If you are new to reversing, please remember that to solve Reversing challenges you probably need to know some C/C++, Assembler and also some experience with gdb (the gnu debugger). And maybe Ghidra. So this challenge is a great place to start Reversing, but unfortunately it's only 10 points because it's easier than other reversing challenges. It probably requires more skills than solving a 10 point Forensics problem like RubberDuck. If you solve the challenge you can use the flag to decrypt the sources and see how the challenge is created.

Ramada.zip
Flag
Rating 4.76
5
4
3
2
1

Discussion

Protected
0

Satisfying, much easier than a previous one — “Rangoon”. Small tip, try to use ghidra and import angr (example script — https://github.com/JanKrasodomski/simple-python-angr/tree/829e960240c2b5b7efadcaafb4fa5712c2d6596a).

0

tedious but cool..

0

That's pretty cool, I really enjoyed it. Thank you very much

0

Thanks, I'm glad you liked it.

0
Protected
0

That's pretty cool, I learned a lot. Thanks author =]

0

Glad you liked it - you're welcome :-)

0

Really good! Finally, a reverse engineering challenge that I was able to solve.

0

Awesome challenge

0

I have to admit...I dont get it. Even though people say its easy. I analysed it via objdump, stepped through it with gdb and got it to print the "whoop whoop" message (with my input of course). So any hints?

0

Can you send me a DM on discord?

0

Sure! Havent used it so far and maybe I can find others to do CTFs together. But I probably wont be able to make it this week.

0

Try binary ninja, it works pretty well: https://binary.ninja/

0

You should use Ghidra. Don't need to play with gdb. Just try to understand the C code

0

Okay, thanks man! Wanted to get started with Ghidra anyway. But doesnt seem Ghidra a bit overkill for a 10p challenge?

0