by XxcoralloxX
This is a simple reverse challenge.
With ida we can see inside the assembly.
A call to 400082 is performed as soon as the program start.
Looking at this function we can see what’s happening:
As you can see, 2 syscalls are performed, one to print the message and one to read the key. Then, there’s a for loop where is happening some manipulation like
key[i]=key[i]^key[i+1]
after that manipulation, we can see that a ‘repe cmpsb’ is performed.
Note: repe repeat the next code (cmp in this case) as many times as the value of ecx.
Debugging with gdb, we can see more cleary what is happening. We notice that this instruction does a cmp between the flag and a fixed string, one byte at the time
let’s see inside this string we find:
0x0a, 0x0d, 0x06, 0x1c, 0x22, 0x38, 0x18, 0x26, 0x36, 0x0f, 0x39, 0x2b, 0x1c, 0x59, 0x42, 0x2c, 0x36, 0x1a, 0x2c, 0x26, 0x1c, 0x17, 0x2d, 0x39, 0x57, 0x43, 0x01, 0x07, 0x2b, 0x38, 0x09, 0x07, 0x1a, 0x01, 0x17, 0x13, 0x13, 0x17, 0x2d, 0x39, 0x0a, 0x0d, 0x06, 0x46, 0x5c, 0x7d
Now it’s time to script, to generate the key. We don’t know the initial char of the key, but we know this property: key[i]=key[i]^key[i+1] So we can script to generate all possible key:
and this is what we can find in the output
XxcoralloxX
tags:reverse
hacklu