This reversing challenge has been designed to give Ghidra and Ida some headaches! It is written in Assembly language and I hope you find it enjoyable and challenging. Please leave a comment indicating if you used Ghidra / Ida as your main tool or found yourself in gdb to reverse this challenge.
The flag embedded in the Regina exe is just the flag kernel, i.e. CTFlearn{kernel} is the full flag and kernel is the embedded string.
Good Luck!
If you solve this challenge you can use the flag kernel to decrypt the sources if you are interested... details are in the readme.
This challenge is just like "Rotterdam Reversing Challenge" Anyway, installing the GEF extension on GDB will make this challenge much easier :D
Thanks and congrats!
Hi, what opener did you use to open Radare2
I didn't analyze with Radare2, only Ghidra.
This challenge is just like "Rotterdam Reversing Challenge" Anyway, installing the GEF extension on GDB will make this challenge much easier :D
Thanks and congrats!
Hi, what opener did you use to open Radare2
I didn't analyze with Radare2, only Ghidra.
5 months ago