Skip to content

Latest commit

 

History

History
58 lines (30 loc) · 1.6 KB

README.md

File metadata and controls

58 lines (30 loc) · 1.6 KB

not-crypto

Write-up author: jon-brandy

DESCRIPTION:

there's crypto in here but the challenge is not crypto... 🤔

HINT:

STEPS:

  1. Given a stripped 64 bit binary file.

image

  1. Let's try to run the binary in gdb.

CHECKING ALL THE FUNCS AVAIL

image

  1. Notice the symbols address is an offset, which means we need to at least run the binary once to get the actual address.
  2. Let's set a random breakpoint first (note the breakpoint shall not interfere with the symbols) so we can check the addresses again.

RESULT

image

image

  1. Great, let's start by set a breakpoint at the memcmp functions to see any leaked comparing values.

RESULT

image

Let's enter any strings.

image

RESULT

image

  1. Notice at the RDI register, the flag is leaked.
  2. Got the flag!

FLAG

picoCTF{c0mp1l3r_0pt1m1z4t10n_15_pur3_w1z4rdry_but_n0_pr0bl3m?}