Easy Live

Rangoon

10 points

41 Solves

Reverse Engineering

Easy

kcbowhunter ctflearn++ badge

Community Rating: 4.75 / 5

This is the third in a series of introductory Reversing Challenges; Reyjkavik, Riyadh and Rangoon. These are designed for people new to Reversing. A little gdb, C and Assembler knowledge should be enough to solve this challenge. Good Luck!

Note that once you solve the challenge, you can use the flag to decrypt the source file used to create the challenge if you are interested in seeing the original C program.

The LiveOverflow channel on YouTube has some great tutorials on reversing, this video has almost everything you need to solve this challenge: https://www.youtube.com/watch?v=VroEiMOJPm8

First 10 Solvers

Rank Username
1 Rivit
2 ebouteillon
3 nierusek
4 Gigimate
5 FwP-IDN
Rank Username
6 naikordian
7 Gilad ctflearn++ badge
8 Molom
9 balcerek
10 Czeslaw

  • nierusek

    It's a very good challenge for practice. I like it.

  • elliot_pwn

    This is so useful for newbies . Really appreciate it man!

      • b4el7d

        Protected

        [REDACTED] This comment is only shown to users who have solved this challenge.

        • kcbowhunter ctflearn++ badge

          Can you send me a PM on Discord @kcbowhunter? It is easier to chat there. I can also send you a version of the exe that does not use the XMM registers.

        • kcbowhunter ctflearn++ badge

          You are on the right track. Determine the number of characters in the flag and determine the location of the '' characters in the flag. Compare the location of the '' characters with the sizes of the available substrings.

  • Surrealig

    Protected

    [REDACTED] This comment is only shown to users who have solved this challenge.

    • kcbowhunter ctflearn++ badge

      Surrealig send me a DM on Twitter or Discord and I will give you some help. @kcbowhunter

    • thebeltz

      Consider that the path the program takes depends on your inputs. Particularly, in the disassebly view, have a look at where the code compares positions 11 and 17 to the char _ .. this should help!