Skip to content

p4yl0ad/hackthebox_rev_cavesystem_angr

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 

Repository files navigation

hackthebox_rev_cavesystem_angr

rev_cavesystem reversing challenge solved with angr

sudo docker run --volume=/home/kali/HTB/CA:/data -it angr/angr

yada yada this is A1D5

  if ( !memcmp(s, "HTB{", 4uLL)
    && (_BYTE)v10 * BYTE5(v6) == 20
    && (_BYTE)v8 - BYTE4(v8) == 0xFA
    && BYTE5(v8) - BYTE2(v7) == 0xD6
    && (_BYTE)v6 - (_BYTE)v10 == 8
    && HIBYTE(v10) - (_BYTE)v5 == 0xD5
[...SNIP you get the point ...]
    && BYTE3(v6) + BYTE2(v10) == 0xA1
    && BYTE1(v11) + BYTE5(v8) == 86
    && (BYTE2(v6) ^ BYTE5(v7)) == 56
    && (BYTE4(v11) ^ BYTE4(v9)) == 9
    && BYTE6(v8) * HIBYTE(v5) == 121
    && (BYTE6(v7) ^ BYTE5(v8)) == 93

solve using SMT and symbolic execution, ezpz.

image

references

About

rev_cavesystem reversing challenge solved with angr

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published