Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- this is the "fixed" version of `flagfinder`, with a little twist.
- checking the binary quickly in IDA shows some XOR'ing happening against the string, followed by a `memcmp`..
- simply setting a breakpoint at `0x400729` and getting the args passed to memcmp, we can find the flag.
- ```
- ctf@ubuntu:~/working$ gdb -q ./flagFinderRedux-e72e7ac9b16b8f40acd337069f94d524
- Reading symbols from ./flagFinderRedux-e72e7ac9b16b8f40acd337069f94d524...(no debugging symbols found)...done.
- (gdb) b *0x400729
- Breakpoint 1 at 0x400729
- (gdb) r blah
- Starting program: /home/ctf/working/flagFinderRedux-e72e7ac9b16b8f40acd337069f94d524 blah
- Breakpoint 1, 0x0000000000400729 in ?? ()
- (gdb) x/s $rax
- 0x7fffffffe4c0: "9447{C0ngr47ulaT1ons_p4l_buddy_y0Uv3_solved_the_re4l__H4LT1N6_prObL3M}"
- ```
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement