File Run 2 PicoCTF Challenge
Can we reverse engineer this picoCTF challenge?
File Run 2 PicoCTF Challenge
File Name run
Main
Function :
- Hold on, aint no way…
- I know
Hello!
will print the flag when passed as an argument to the program but lets gets the flag statically without running this at all! - Lets double click into the flag variable and see where that takes us in binja.
flag
var :
- Now double clicking to see whats being stored at that memory address.
0x2004
- 0x2020
- Nice, and that’s it for this one folks or ofc cant forget the other solution.
This post is licensed under CC BY 4.0 by the author.