Hello, In this article I will describe how I solved the GB - Basic GameBoy crackme challenge from Root-Me. Before reading this article you should attempt to solve the challenge on your own. Start by reading/skimming through the GameBoy CPU manual then download an emulator such as mGba and play with the ROM. To disassemble the ROM I've used Ghidra and mgbdis. … Continue reading Root-Me: GB – Basic GameBoy crackme walkthrough
crackme
Root Me – Xor Madness – Walkthrough
Hello, In this article I will describe how I solved the PE x86 - Xor Madness challenge from Root-Me This challenge will ask you for a password and the password is also used to validate the flag. What makes this challenge interesting is that it only uses xor, sub, call and ret. Here's how I approached the challenge: Since the binary had a … Continue reading Root Me – Xor Madness – Walkthrough
Practical Binary Analysis – CTF Walkthrough – Level 3, 4
Hello, In this article I'll present you my solution on the Chapter 5 CTF from the book Practical Binary Analysis. For this binary, the hint is to fix four broken things. Running file gives us the following response: binary@binary-VirtualBox:~/ctf$ file ./lvl3 ./lvl3: ERROR: ELF 64-bit LSB executable, Motorola Coldfire, version 1 (Novell Modesto) error reading (Invalid … Continue reading Practical Binary Analysis – CTF Walkthrough – Level 3, 4
Protected: Root-Me: ELF C++ – 0 protection solution
There is no excerpt because this is a protected post.