Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Hexable writeup. #21

Open
wants to merge 1 commit into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions SUMMARY.md
Original file line number Diff line number Diff line change
Expand Up @@ -25,6 +25,7 @@
* [Fzz Buzz 2 \[200 points\]](/programming/fzz-buzz-2-200-points.md)
* [Match Me \[300 points\]](/programming/match-me-300-points.md)
* [Reverse Engineering](reverse-engineering.md)
* [Hexable \[25 points\]](/reverse-engineering/hexable-25-points.md)
* [Useless Python \[50 points\]](/reverse-engineering/useless-python-50-points.md)
* [Phunky Python II \[115 points\]](/reverse-engineering/phunky-python-ii-115-points.md)
* [Hex QR \[200 points\]](/reverse-engineering/hexqr-200-points.md)
Expand Down
2 changes: 1 addition & 1 deletion reverse-engineering.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

This category challenges your deductive ability to use a program's behavior and output to figure out its input, thus reversing the original behavior of the program. The reverse engineering challenges for this contest are:

* Hexable \[25 points\]
* [Hexable \[25 points\]](/reverse-engineering/hexable-25-points.md)
* Phunky Python I \[30 points\]
* [Useless Python \[50 points\]](//reverse-engineering/useless-python-50-points.md)
* [Phunky Python II \[115 points\]](//reverse-engineering/phunky-python-ii-115-points.md)
Expand Down
22 changes: 22 additions & 0 deletions reverse-engineering/hexable-25-points.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
# Hexable - 25 points

I tried to hide a flag sneakily, can you find it? [Download](https://github.com/EasyCTF/easyctf-2017-problems/blob/master/hexable-autogen/hexable)

### Solution

The challenge file was a small executable of 235 bytes:

```
$ file hexable
85b33e8a48a9e129d23c20483b4b12cd1d199708_hexable: ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked, stripped
```

[strings](https://en.wikipedia.org/wiki/Strings_%28Unix%29) was lucky and found a flag in plaintext.

```
$ strings -a hexable
Can you find the flag?
easyctf{PT4z0pqN1xQuXm}
```

### External Writeups