Intro to Reversing 1 - localo

Category: Reverse Engineering
Difficulty: Baby
Author: 0x4d5a

Description

This is a introductory challenge for beginners which are eager to learn reverse engineering on linux. The three stages of this challenge will increase in difficulty. But for a gentle introduction, we have you covered: Check out the video of LiveOverflow or follow the authors step by step guide to solve the first part of the challenge.

Once you solved the challenge locally, grab your real flag at: nc hax1.allesctf.net 9600

Note: Create a dummy flag file in the working directory of the rev1 challenge. The real flag will be provided on the server

Summery

The author provided a simple password checker. If the password is correct we get the flag.

Solution

  1. Just use strings on the binary and grab the password.
$ strings rev1
/lib64/ld-linux-x86-64.so.2
libc.so.6
exit
fopen
puts
__stack_chk_fail
printf
[...]
Give me your password:
y0u_5h3ll_p455
Thats the right password!
Flag: %s
Thats not the password!
./flag
[...]
  1. Use the string that is most 1337:
    y0u_5h3ll_p455
  2. Get the flag:
$ nc hax1.allesctf.net 9600
Give me your password:
y0u_5h3ll_p455
Thats the right password
Flag: CSCG{ez_pz_reversing_squ33zy}
  1. write a writeup

Mitigation

Flag

CSCG{ez_pz_reversing_squ33zy}