Reverse Engineering Series — 1

Hey Squad,

Hey Squad,

This is going to be a series on Reverse Engineering. Let’s learn RE together. Any suggestion is appreciated.

file:

link: https://github.com/d0minikkkk/reversinghero-contents/blob/master/1/x1

Tools:

  • file
  • ltrace
  • strings
  • ghex
  • ida64
  • Ghidra

Binary Analysis

file
strings

From the above analysis, we can find out that it uses printf, fdopen, fgets, strcmp, strcspn.

IDA PRO Analysis

graph tree from IDA PRO

let’s analyse the blocks….

Added comments to the block

From the above assembly, we can find that the binary will print the password if we pass the right password. The password is `d(-_-)b//d(+_+)b\\d(-_-)b`

Ghidra Analysis

ghidra view of the binary

Cracking

we will pass the input to the binary now and get the key.

3E437BBA43971D612049DE8AD54FDEF068931E8C6D26F63D83742F932E740B6D

Please give a clap if you found it to be useful and follow me to get more hacking knowledge.