Skip to content

Took on a hard level of reverse engineering from pwn.college. The level number is 21-1 and is based on yan85 architecture which is a custom architecture used in Capture The Flags (CTF). Here we have to identify the function of the different syscalls we can use and then call those syscalls using teh input from a buffer

Notifications You must be signed in to change notification settings

Ishaan910/reverse_engineering_project

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 

Repository files navigation

I opened the challenge executable in ida-free and decompiled it. Then deeply inspected the decompiled code and renamed the functions based on my preference. (There were multiple functions like write, read_fd, sleep, open, etc.) After renaming, I started mapping the numbers with each function and register in a table(mae it easier to write the final script). Then I accordingly called the syscalls in the script and executed it

About

Took on a hard level of reverse engineering from pwn.college. The level number is 21-1 and is based on yan85 architecture which is a custom architecture used in Capture The Flags (CTF). Here we have to identify the function of the different syscalls we can use and then call those syscalls using teh input from a buffer

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages