Regina
60 points Medium

This reversing challenge has been designed to give Ghidra and Ida some headaches! It is written in Assembly language and I hope you find it enjoyable and challenging. Please leave a comment indicating if you used Ghidra / Ida as your main tool or found yourself in gdb to reverse this challenge.

The flag embedded in the Regina exe is just the flag kernel, i.e. CTFlearn{kernel} is the full flag and kernel is the embedded string.

Good Luck!

If you solve this challenge you can use the flag kernel to decrypt the sources if you are interested... details are in the readme.

Regina.zip
Flag
Rating 5.00
5
4
3
2
1

Discussion

Protected
0
Protected
0

This challenge is just like "Rotterdam Reversing Challenge" Anyway, installing the GEF extension on GDB will make this challenge much easier :D

0

Cool and tricky challenge! I used ghidra to solve this. OMW to the last 2 hard bosses

0

I used gdb to solve it

0

Thanks and congrats!

0

Hi, what opener did you use to open Radare2

0

I didn't analyze with Radare2, only Ghidra.

0

`11

0

Creating a challenge is more difficult than solving it. Nice work, thanks!

5

Deserves at least 80 points. Had to use only assembly code - decompilation indeed didn't work (at least with Ghidra and r2dec)

0

Thanks for the feedback, I was wondering about the point value for the challenge. And congrats on being the first solver! I put a lot of thought and work into creating this challenge, thanks for solving it.

0