I opened the challenge executable in ida-free and decompiled it. Then deeply inspected the decompiled code and renamed the functions based on my preference. (There were multiple functions like write, read_fd, sleep, open, etc.) After renaming, I started mapping the numbers with each function and register in a table(mae it easier to write the final script). Then I accordingly called the syscalls in the script and executed it
-
Notifications
You must be signed in to change notification settings - Fork 0
Took on a hard level of reverse engineering from pwn.college. The level number is 21-1 and is based on yan85 architecture which is a custom architecture used in Capture The Flags (CTF). Here we have to identify the function of the different syscalls we can use and then call those syscalls using teh input from a buffer
Ishaan910/reverse_engineering_project
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
About
Took on a hard level of reverse engineering from pwn.college. The level number is 21-1 and is based on yan85 architecture which is a custom architecture used in Capture The Flags (CTF). Here we have to identify the function of the different syscalls we can use and then call those syscalls using teh input from a buffer
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published