Skip to content

Latest commit

 

History

History
42 lines (23 loc) · 1.44 KB

b1h0-whitecr0w_Easy_Peasy.md

File metadata and controls

42 lines (23 loc) · 1.44 KB

Date: 05/oct/2019

To analyze this file I have used Ghidra and x64dbg, simply by trying both tools and seeing the differences. It is good to contrast and train in both dynamic and static.

Ghidra - notes

  1. Load executable and Analyze.
  2. Search in Symbol Tree left dialog the text "main".
  3. In Listing you can see at address 0040155a the username that is: "iwonderhowitfeelstobeatimetravel"
  4. Next, at address 0040158c the password is revealed to us: heyamyspaceboardisbrokencanyouhelpmefindit?
  5. In the code decompilation window you can also see clearly.
  6. I think we don't need anything else.

EP_000

x64dbg - notes

  • Its a 64bits Windows exe

  • Strings with the username and password are also revealed quickly and without problems from 00401553: "iwonderhowitfeelstobeatimetraveler", "heyamyspaceboardisbrokencanyouhelpmefindit?".

EP_001

  • The string in .rdata section at 0000000000488000

EP_002

  • What else?

EP_003