Jump to content
Tuts 4 You

Recommended Posts

Posted

For challenge #9:
 

  Reveal hidden contents

 

Extreme Coders
Posted (edited)
  On 11/3/2022 at 5:38 AM, upx said:

For challenge #9:

Expand  
  Reveal hidden contents

 

Edited by Extreme Coders
  • Like 1
Posted

I'm stuck on Ch#10.  Can someone give me a hand?

 

  Reveal hidden contents

 

Posted

@pcmcia

  Reveal hidden contents

 

Posted
  On 11/4/2022 at 7:31 AM, deepzero said:

@pcmcia

  Reveal hidden contents

 

Expand  

@deepzeroThanks!

  Reveal hidden contents

 

Posted

@pcmcia: read carefully what Deepzero said earlier.

Posted
  On 11/4/2022 at 10:34 AM, kao said:

@pcmcia: read carefully what Deepzero said earlier.

Expand  
  Reveal hidden contents

 

Extreme Coders
Posted

@pcmcia

  Reveal hidden contents

 

Posted
  On 11/4/2022 at 11:09 AM, Extreme Coders said:

@pcmcia

  Reveal hidden contents

 

Expand  

@Extreme CodersThanks!  I got it now. 

  Reveal hidden contents

 

DoIReviewMods
Posted (edited)

a

Edited by DoIReviewMods
Posted
  Reveal hidden contents

For Challenge #9 again

Posted
  Reveal hidden contents

 

For Ch 9, it's all about the cryptography concept. Once you identified the algorithm, the university lecture notes helps me revise the concepts and aided me in the analysis.

Posted

It's over. Thank you guys! Especially @Washi and @kao. I hope I will have a chance to work again in next year.

Posted
  On 11/14/2022 at 6:46 PM, Washi said:

I haven't done writeups for challenge 10 and 11 yet, as I do feel I cheesed them a bit and don't really have proper notes on them.

Expand  

Pretty please! :) As you can see in Rurik's writeups above, pretty much everyone did that...

Posted

Just for fun, check out my exotic solution for #5 in form of a superhacky bruteforce script ... cuts down required reversing to a minimum.

runtime is about 30 min ... ;)

import ida_dbg, ida_bytes

def onerun(msec):
    ida_dbg.run_to(0x006C1064)
    ida_dbg.wait_for_next_event(ida_dbg.WFNE_SUSP, -1)
    eax = ida_dbg.get_reg_val("eax")
    #print("eax: ", eax)
    ida_dbg.step_over()
    ida_dbg.wait_for_next_event(ida_dbg.WFNE_SUSP, -1)
    #eax = 0xbcfc90
    ida_dbg.write_dbg_memory(eax, bytes.fromhex("E6 07 06 00 02 00 0E 00 12 00 0E 00 24 00 00 00"))
    idaapi.put_word(eax + 14, msec)
    systime = idaapi.get_bytes(eax, 16)
    ida_dbg.run_to(0x006C3DDF)
    ida_dbg.wait_for_next_event(ida_dbg.WFNE_SUSP, -1)
    eax = ida_dbg.get_reg_val("eax")
    deax = idaapi.get_dword(eax)
    #print(hex(deax))
    strl = ida_bytes.get_max_strlit_length(deax, ida_nalt.STRTYPE_C_16)
    ss = ida_bytes.get_strlit_contents(deax, strl, ida_nalt.STRTYPE_C_16)
    ss = ss.decode("ascii")
    ida_dbg.exit_process()
    ida_dbg.wait_for_next_event(ida_dbg.WFNE_SUSP, -1)
    print(str(ss))
    if ss == "ydN8BXq16RE=":
        print("hit!", msec)
        return True
    return False

for i in range(1001):
    if onerun(i):
        break

 

  • Like 1
  • Haha 2
Posted

For ch-2, opened it in cerbero profiler, found two images, performed an online image diff, got the flag. It was a little difficult to read the flag from diff'd image but entered the flag correctly after 5-10 attempts.. 

  • Haha 2

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...