Post

Bbbbloat PicoCTF Challenge

Reverse engineering a stripped linux executable

Bbbbloat PicoCTF Challenge

Always Do One Of These Before Anything

screenshot_30012025_154832

Stripped binaries are always fun to read …

screenshot_30012025_155406

  • Immediatly looking into main(), we see a comparison happening
1
2
if (var_48 != 0x86187)
    puts(str: "Sorry, that's not it!")
  • Nice, so if var_48 is not qual to 0x86187 call puts(). Instresting …
  • 0x86187 is 549255 in decimal, its the programs favorite number!!!

Just incase you didnt know we can do this

screenshot_30012025_160427

Lets Attempt Getting The Flag!

screenshot_30012025_161233

Coolest looking cat ever

image

This post is licensed under CC BY 4.0 by the author.