Regina
60 points Medium

This reversing challenge has been designed to give Ghidra and Ida some headaches! It is written in Assembly language and I hope you find it enjoyable and challenging. Please leave a comment indicating if you used Ghidra / Ida as your main tool or found yourself in gdb to reverse this challenge.

The flag embedded in the Regina exe is just the flag kernel, i.e. CTFlearn{kernel} is the full flag and kernel is the embedded string.

Good Luck!

If you solve this challenge you can use the flag kernel to decrypt the sources if you are interested... details are in the readme.

Regina.zip
Flag
Rating 5.00
5
4
3
2
1

Discussion

Protected
0
Protected
0

This challenge is just like "Rotterdam Reversing Challenge" Anyway, installing the GEF extension on GDB will make this challenge much easier :D

0

Cool and tricky challenge! I used ghidra to solve this. OMW to the last 2 hard bosses

0

I used gdb to solve it

0

Thanks and congrats!

0

Hi, what opener did you use to open Radare2

0

I didn't analyze with Radare2, only Ghidra.

0

`11

0

Creating a challenge is more difficult than solving it. Nice work, thanks!

5