FactCheck PicoCTF Challenge
Reverse Engineering The easiest binary in the world, lol! Load up the ctf and follow along.
FactCheck PicoCTF Challenge
By Far The Easiest Crackme Ever To Exist
Inspecting inside of binja we see :
What does this main function do??
- Does a shit ton of c++ string handling!
- At the last operator we see a concatenating
'}'
which in hex is0x7d
. Nice maybe the end of the ctf flag??? - Set a bp at the first instruction after that last call to the operator.
the flag is being stored in the RAX register as we see.
1
flag = picoCTF{wELF_d0N3_mate_239b483f}
This post is licensed under CC BY 4.0 by the author.