Bbbbloat PicoCTF Challenge
Reverse engineering a stripped linux executable
Bbbbloat PicoCTF Challenge
Always Do One Of These Before Anything
Stripped binaries are always fun to read …
- Immediatly looking into
main()
, we see a comparison happening
1
2
if (var_48 != 0x86187)
puts(str: "Sorry, that's not it!")
- Nice, so if
var_48
is not qual to0x86187
callputs()
. Instresting … 0x86187
is549255
in decimal, its the programs favorite number!!!
Just incase you didnt know we can do this
Lets Attempt Getting The Flag!
Coolest looking cat ever
This post is licensed under CC BY 4.0 by the author.