Skip to content
This repository has been archived by the owner on Oct 11, 2023. It is now read-only.

Latest commit

 

History

History

powerPacker

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 

powerPacked

reverse

Author: jorkanofaln

a packed powerpc 32bit compiled using anti-debugging

Setup

Add challenge to the challenge repository

Writeup

Open the binary in Hopper Disassembler in order to reverse engineer it.

Try to find the main function.

Since the main function, doesn't exist scroll at the bottom of the disassembly page to find the packer used to obfuscate/pack the binary.

Then unpack the binary using the upx -d command.

Open the unpacked binary in Hopper.

Go to the main function

Continue Analyzing the dissambled code

find the the 0xffffe number

substract it to the first string

There you have the flag! CFI{i_love_powerpc}