Easy Live

Riyadh

10 points

32 Solves

Reverse Engineering

Easy

kcbowhunter ctflearn++ badge

Community Rating: 4.67 / 5

Another entry level Reversing challenge, if you are new to Reversing you probably want to try my Reyjkavik challenge before attempting this challenge. Good Luck! The flag is hidden inside the Riyadh program. Solve the Challenge, get the flag, and I have included the encrypted sources used to create the challenge in the Riyadh.zip file. If you do to the work of solving the Challenge, I'm providing the Challenge source code (C++ and Python) if you are interested in studying the sources after solving the challenge. I think this is a great way to improve your Reversing skills when learning. Please don't share the sources or flag after you solve the challenge.

First 10 Solvers


  • Londek

    As we all know, XOR is basic element of nowaday encryption algorithms

    • Rivit

      Protected

      [REDACTED] This comment is only shown to users who have solved this challenge.

  • SunTzu

    I think it's worth more than 10 points

  • rasyidmf

    it took me about 1 hours, i should you need to change about 40 point. also im not see some instruction too

    • kcbowhunter ctflearn++ badge

      My (easier) reversing challenge Reykjavik has a number of links to tutorials etc for getting started in Assembly and Reversing.

  • rasyidmf

    Protected

    [REDACTED] This comment is only shown to users who have solved this challenge.

  • SquidBoy

    Protected

    [REDACTED] This comment is only shown to users who have solved this challenge.

    • kcbowhunter ctflearn++ badge

      Protected

      [REDACTED] This comment is only shown to users who have solved this challenge.

    • kcbowhunter ctflearn++ badge

      Thanks... if you enjoyed this you might also enjoy my Rangoon Reversing Challenge.

  • SHaNTuDe

    Great challenges, I love the progression from easy to medium to hard. Up next: Rangoon

    • kcbowhunter ctflearn++ badge

      Glad you liked it, I have another one almost ready to submit called Recklinghausen

  • Tor1

    bro i am stuck i can't change flag values ................ HELP

    • kcbowhunter ctflearn++ badge

      Have you watched this video? https://www.youtube.com/watch?v=VroEiMOJPm8

      • Tor1

        i have it helped in solving Reykjavik but not here

        • kcbowhunter ctflearn++ badge

          Can you send me a private message on Twitter or Discord @kcbowhunter and describe your problem?

  • impregnable

    I am not understanding this line : cmp BYTE PTR [rbp+0x1c],al I have watched the youtube videos. Kindly help

    • kcbowhunter ctflearn++ badge

      https://www.tutorialspoint.com/assembly_programming/assembly_conditions.htm http://www.c-jump.com/CIS77/ASM/Instructions/I77_0250_ptr_pointer.htm

      Google is your friend :-)

  • impregnable

    <ol> <li>cmp BYTE PTR [rbp+0x1c],al : 2. je 0x1384 <main+644> I want that the condition is true and it jumps . I have tried doin set $rax=$al and set $rax=0x1c but I am not understanding how to do it and I do not want to read the whole code and set value of rax to value of al because thats not the correct way . Kindly help and I hope I am on the right way to get the flag</li> </ol>

    • kcbowhunter ctflearn++ badge

      Can you try just setting the CX register after the CMP instruction?