Rangoon
10 points Easy

This is the third in a series of introductory Reversing Challenges; Reyjkavik, Riyadh and Rangoon. These are designed for people new to Reversing. A little gdb, C and Assembler knowledge should be enough to solve this challenge. Good Luck!

Note that once you solve the challenge, you can use the flag to decrypt the source file used to create the challenge if you are interested in seeing the original C program.

The LiveOverflow channel on YouTube has some great tutorials on reversing, this video has almost everything you need to solve this challenge: https://www.youtube.com/watch?v=VroEiMOJPm8

Rangoon.zip
Flag
Rating 4.54
5
4
3
2
1

Discussion

It took me more than I expected :/ I believe this approach is an original one, for sure it is not perfect — “search and brute” (example script: https://github.com/JanKrasodomski/simple-python-brute-force/blob/283b54f71dcd3dcfa2a52142a75e28f1e7d83f57/simple_brute.py).

0

wow.. nice puzzle

0

how to decrypt the source code files with the flag?

0

Instructions are given in one of the files, it is done with openssl

0

the instructions are in the 'readme' file

0

Really Enjoyed This Challenge :) But Doesn't Seems to require Dynamic Analysis, as specified in some comments

I have used Cutter to solve it though

0

I really enjoyed solving this one. Thanks!

1

This challenge is definitely worth more than just 10 points :/

1

I made it 10 points because it is a very simple reversing challenge. I understand that is more complex than RubberDuck which is also only worth 10 points.

0
Protected
1

This is so useful for newbies . Really appreciate it man!

0

My pleasure, thanks for the feedback.

0
Protected
0

Can you send me a PM on Discord @kcbowhunter? It is easier to chat there. I can also send you a version of the exe that does not use the XMM registers.

0

sure see u later

0

You are on the right track. Determine the number of characters in the flag and determine the location of the '' characters in the flag. Compare the location of the '' characters with the sizes of the available substrings.

0