NucuLabs.dev

Share this post

Root-Me Reversing: crackme_wtf hints

nuculabs.dev

Discover more from NucuLabs.dev

Programming, Cloud and Engineering! 👨‍🔬
Continue reading
Sign in

Root-Me Reversing: crackme_wtf hints

Denis Nuțiu
Aug 4, 2019
Share this post

Root-Me Reversing: crackme_wtf hints

nuculabs.dev
Share

It's been some time since I've done some Reverse Engineering and today I've completed a simple challenge on https://www.root-me.org/. The filename of the challenge is crackme_wtf and here are some hints to get you started:

  1. Determine type of FILEs.

  2. Don't be afraid to patch and use a debugger.

  3. Try to eliminate the randomness. Maybe some functions that have to do with time, random numbers or the current process's id.

  4. If the last hint doesn't yield any results... Is the required password really needed to get to the flag?

Thanks for reading and good luck!

Share this post

Root-Me Reversing: crackme_wtf hints

nuculabs.dev
Share
Previous
Next
Comments
Top
New

No posts

Ready for more?

© 2023 NucuLabs.dev
Privacy ∙ Terms ∙ Collection notice
Start WritingGet the app
Substack is the home for great writing