Skip to content
Snippets Groups Projects
Verified Commit 7789ef7b authored by Daniel Petri's avatar Daniel Petri
Browse files

Initial commit

parents
Branches main
No related tags found
No related merge requests found
# Reverse Engineering
## Tools
- `file`
- `strings`
- `objdump`
- `ldd`
- `ltrace`
- `strace`
- Ghidra
- Binary Ninja
- gdb
- Pwndbg
## intro-rev-1
Credit: [CSCG 2023](https://cscg.de)
- Demo static analysis
## intro-rev-2
Credit: [CSCG 2023](https://cscg.de)
- Try yourself with static analysis!
- Demo dynamic analysis
## Anti-Rev Techniques
- Stripping symbols
- Static linking
- Obfuscation
## intro-rev-3
- Try yourself!
## Other Challenges to try
- PicoCTF
- Try Java, .NET challenges and tools!
- license-checker (CSCG 2023)
- Flavors (UMDCTF 2024)
- Random programming languages
- En-Pawnssant (CSCG 2021) (harder)
File added
File added
# En-Pawnssant
from **[Cyber Security Challenge Germany 2021 Qualifiers CTF](https://cscg.de)** (March 1 - June 1, 2021)
## Challenge
- **Category:** Reverse Engineering
- **Difficulty:** Hard
- **Author:** 0x4d5a
> Let's play a game of queens. No, a game of [pawns](https://www.compuphase.com/pawn/pawn.htm). I'll take en passant. No wait. I'm confused. All I know for sure is, that this Makefile was used:
```Makefile
PAWN := $(shell hexdump -n 4 -e '4/4 "%08X" 1 "\n"' /dev/random)
all:
./pawncc -k$(PAWN) crackme.p
```
**Files:**
- [`crackme.amx`](./crackme.amx)
\ No newline at end of file
File added
# run via docker compose :)
FROM ubuntu:22.04
RUN apt-get update
RUN apt-get -y install socat
RUN useradd -d /home/ctf/ -m -p ctf -s /bin/bash ctf
RUN echo "ctf:ctf" | chpasswd
WORKDIR /home/ctf
COPY rev1 .
COPY flag.txt .
USER ctf
CMD socat -ddd TCP4-LISTEN:1024,fork,reuseaddr exec:./rev1,pty,echo=0,raw,iexten=0
\ No newline at end of file
File added
File added
CSCG{testflag}
File added
File added
# run via docker compose :)
FROM ubuntu:22.04
RUN apt-get update
RUN apt-get -y install socat
RUN useradd -d /home/ctf/ -m -p ctf -s /bin/bash ctf
RUN echo "ctf:ctf" | chpasswd
WORKDIR /home/ctf
COPY rev2 .
COPY flag.txt .
USER ctf
CMD socat -ddd TCP4-LISTEN:1024,fork,reuseaddr exec:./rev2,pty,echo=0,raw,iexten=0
CSCG{testflag}
File added
File added
File added
File added
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment