
Comparision of Reverse-Engineering Tools
Let’s compare the most populare reverse-egineering with strong focus on personal usage: BinaryNinja, Ghidra, IDA and radare2. ...
Let’s compare the most populare reverse-egineering with strong focus on personal usage: BinaryNinja, Ghidra, IDA and radare2. ...
Warmup Warmup : Welcome to securinets CTF In this task we are dealing with very simple function main: undefined8 main(void) { int64_t iVar1; undefined8 uVar2; uint32_t var_8h; undefined8 var_4h; write(1, 0x988, 0x1a); read(0, 0x201080, 0x31); iVar1 = strlen(0x201080); *(undefined *)(iVar1 + 0x20107f) = 0; var_8h = 0; strcpy(rsi, 0x201080); uVar2 = strlen(0x201080); memfrob(0x201080, uVar2); var_4h._0_4_ = 0; while ((int32_t)var_4h < 0x14) { var_8h = var_8h + (int32_t)(char)(*(uint8_t *)((int64_t)(int32_t)var_4h + 0x201020) ^ *(uint8_t *)((int64_t)(int32_t)var_4h + 0x201080)); var_4h._0_4_ = (int32_t)var_4h + 1; } if (var_8h == 0) { printf(0x9a8, rsi); } else { puts(0x9d5); } return 0; } In this function the memfrob is used, from manual you can learn that this function is xoring buffer with key 42, solution: ...
[re] Snake (10) Description Short info about task: Name: Snake Difficulty: easy Score: 10 Flag should be in the format: HTB{username:password} Overview We have got the python script that is waiting for some username and password: $ python snake.py ___________.__ _________ __ \__ ___/| |__ ____ / _____/ ____ _____ | | __ ____ | | | | \_/ __ \ \_____ \ / \__ \ | |/ // __ \ | | | Y \ ___/ / \ | \/ __ \| <\ ___/ |____| |___| /\___ > /_______ /___| (____ /__|_ \___ > \/ \/ \/ \/ \/ \/ \/ The Snake Created by 3XPL017 Your number is 809 Authentication required Enter your username QWE Wrong username try harder Let’s look into code to get more info about how to get username and password. ...
Plugins worth installing ...
How to expose any port to the Internet without exposing your private IP (for free). ...