Post

File Run 2 PicoCTF Challenge

Can we reverse engineer this picoCTF challenge?

File Run 2 PicoCTF Challenge

File Name run

image

Main Function :

image

  • Hold on, aint no way…
  • I know Hello! will print the flag when passed as an argument to the program but lets gets the flag statically without running this at all!
  • Lets double click into the flag variable and see where that takes us in binja.

flag var :

screenshot_31012025_193209

  • Now double clicking to see whats being stored at that memory address.

0x2004 - 0x2020

screenshot_31012025_205530

  • Nice, and that’s it for this one folks or ofc cant forget the other solution.

screenshot_31012025_205847

This post is licensed under CC BY 4.0 by the author.