Jump to content
Tuts 4 You
Sign in to follow this  
kao

Flare On 5

Recommended Posts

les4r

If you've already decrypted the communication between the sample and the C&C, it should be trivial. The communication between the sample and JJ-pc is encrypted using the same scheme, but with another session key.

Share this post


Link to post
bandit

Yup. Figured out both communications. Was able to get past it.

Any hints for #12? I'm able to get to the VM image but need some help figuring out how the passwd is being validated.

 

Share this post


Link to post
Extreme Coders

@bandit You try tracing the execution, which memory cells are accessed and modified in what way. Quite time taking to say the least.

Share this post


Link to post
bandit

Is that the last stage of the challenge (the l_e_q)?

Or am i in another assembly hell after solving that? :P

Share this post


Link to post
Extreme Coders

Of course not! Welcome to the matrix.

Share this post


Link to post

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
Sign in to follow this  
×
×
  • Create New...