Riyadh
10 points Easy

Another entry level Reversing challenge, if you are new to Reversing you probably want to try my Reyjkavik challenge before attempting this challenge. Good Luck! The flag is hidden inside the Riyadh program. Solve the Challenge, get the flag, and I have included the encrypted sources used to create the challenge in the Riyadh.zip file. If you do to the work of solving the Challenge, I'm providing the Challenge source code (C++ and Python) if you are interested in studying the sources after solving the challenge. I think this is a great way to improve your Reversing skills when learning. Please don't share the sources or flag after you solve the challenge.

Riyadh.zip
Flag
Rating 4.65
5
4
3
2
1

Discussion

This one was a piece of cake after solving Reyjkavik XD This was a great challenge, if with Reyjkavik I learned about GDB a lot, this time I used those same skills to solve it, no 90% time spent on reading and watching tutorials

0

nice challenge, I had thought there are a lot of code to understand when i suddenly find the flag.

0

glad you liked it.

0
Protected
0
Protected
0
Protected
0

I overthought and wasted a lot of time, it's easy

0

It's not easy. Done with Snowman + CyberChef + CodeBlocks.

0

Reversing assumes a knowledge of assembler and C. An easy Reversing challenge is going to be much more difficult than an easy forensics challenge that just requires the use of strings and base64. I gave it 10 points because it is an easy Reversing challenge when compared to other reversing challenges, not compared to an easy forensics challenge.

3

Another really good one. I learn more and more about GDB with each of these challenges, it's really a great introduction to reverse engineering.

1

Thanks!

0