Hello, here’s my take on the picoCTF2019 reverse engineering asm challenges. If you don’t know assembly, please watch a few tutorials on it: http://opensecuritytraining.info/IntroX86.html http://opensecuritytraining.info/IntermediateX86.html asm1 – Points: 200 CMP: Compares the first source operand with the second source operand and sets the status flags in the EFLAGS register according to the results. The comparison is performed by subtracting the … Read more
I’m always late to the party but here’s my solutions to the PicoCTF2019 Vault Doors challenges from the reverse engineering section. I did it this mainly to improve my skills and hopefully to learn some new things. vault-door-training – Points: 50 Your mission is to enter Dr. Evil’s laboratory and retrieve the blueprints for his Doomsday Project. The laboratory is … Read more
Hello, Here’s my write-up for the Reversing DSYM challenge from HackTheBox. PDF: https://1drv.ms/b/s!ApWG8dlpzmQV-F7NJOZ2GJ0-f0ZJ The password for the Write-Up is the challenge’s flag. To solve it I’ve used: https://ghidra-sre.org/ https://gchq.github.io/CyberChef/ Write a comment if you need a hint or something is not clear. Thanks for reading!