Hello, here's my take on the picoCTF2019 reverse engineering asm challenges. If you don't know assembly, please watch a few tutorials on it: http://opensecuritytraining.info/IntroX86.htmlhttp://opensecuritytraining.info/IntermediateX86.html asm1 - Points: 200 CMP: Compares the first source operand with the second source operand and sets the status flags in the EFLAGS register according to the results. The comparison is … Continue reading picoCTF2019 Reverse Engineering Asm
I'm always late to the party but here's my solutions to the PicoCTF2019 Vault Doors challenges from the reverse engineering section. I did it this mainly to improve my skills and hopefully to learn some new things. vault-door-training - Points: 50 Your mission is to enter Dr. Evil's laboratory and retrieve the blueprints for his … Continue reading picoCTF 2019 Reverse Engineering Vault Doors
Hello, Here are some hints for solving the Debug Me challenge on HackThebox: Use a good debugger like x64dbgUse an anti-anti-debugging plugin like Scylla Hide. (read the instructions on how to install it)Step through the challenge and see where it takes you. Write-up: Debug Me Thanks!
Hello, Here's my write-up for the Reversing DSYM challenge from HackTheBox. PDF: https://1drv.ms/b/s!ApWG8dlpzmQV-F7NJOZ2GJ0-f0ZJ The password for the Write-Up is the challenge's flag. To solve it I've used: https://ghidra-sre.org/https://gchq.github.io/CyberChef/ Write a comment if you need a hint or something is not clear. Thanks for reading!