All things reversed
  • Home
  • Socials

hitcon

A collection of 4 posts
HITCON 2022 - Checker
hitcon

HITCON 2022 - Checker

just a deep and normal checker We have two files in this task: a Windows executable named checker.exe and a .sys file—a driver file named checker_drv.sys. Loading the first one into Ghidra, does not show much code that we can work with. There's a line that
Nov 29, 2022 3 min read
HITCON 2022 - Meow Way
hitcon

HITCON 2022 - Meow Way

Reverse-engineering like the meow way! We are given a Windows 32-bit executable that we can load into Ghidra. In the initial peak into the main, we can see the following (*DAT_0040544c)(iVar3,iVar3 >> 0x1f,iVar3,iVar3 >> 0x1f,0xc4,0,&local_10,&local_10 >> 0x1f); iVar2 = iVar3 + 1; (*DAT_004053a8)
Nov 27, 2022 5 min read
Core Dumb - HitCon 2019
hitcon

Core Dumb - HitCon 2019

Note: challenge was solved together with Disconnected. Damn it my flag checker is so buggy it destroyed the program itself 😱 All I left is a core dump file :( Could you help me recover the flag ? Q_Q Let's start by checking the file that we are given in this challenge:
Jan 16, 2020 4 min read
Hitcon 2019 Qualification - EV3 Arm
lego

Hitcon 2019 Qualification - EV3 Arm

It's one of those challenges that brings together two things that I like - this time it was reverse engineering nad lego bricks. What was the input in this challenge was a picture that, supposedly depict how the robot was programmed and a rbf file that contains the aforementioned robot
Dec 21, 2019 2 min read
Page 1 of 1
All things reversed © 2023
  • Data & privacy
  • Contact
  • Contribute →
Powered by Ghost