04 - flag
Last updated
Was this helpful?
Last updated
Was this helpful?
Papa brought me a packed present! let's open it.
Download:
This is a reversing task. all you need is binary
running the binary outputs this:
NO input, just this. Opening a debugger won't help, this binary is packed. It is hinted in the challenge description and confirmed if one tries to debug this monstrosity.
To find how the binary was packed run the strings command, and look for strings longer than 30 characters [this number was chosen arbitrary, not too short and not too long].
To examine the file we need to unpack it using UPX.
The main function looks like this
They told the truth, It seems the flag is really copied to a malloced location.
We'll set a breakpoint after the copying and examine the memory marked as "flag".