Reverse Engineering 0x4 Fun

Reverse Engineering & Windows Internals.

Friday, April 7, 2017

Nuit du Hack XV Quals - Reverse 350: Matriochka step 4 (I did it again)

Binary file download : https://goo.gl/MhVl0g

This script, when executed under IDA, writes the correct input to an output file :



The flag is simply the md5sum of this file :

Posted by Souhail Hammou at 12:51 AM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

About Me

My photo
Souhail Hammou
View my complete profile

Blog Archive

  • ►  2019 (5)
    • ►  August (1)
    • ►  May (1)
    • ►  April (1)
    • ►  March (1)
    • ►  February (1)
  • ►  2018 (3)
    • ►  October (1)
    • ►  September (1)
    • ►  February (1)
  • ▼  2017 (6)
    • ►  November (3)
    • ►  June (1)
    • ►  May (1)
    • ▼  April (1)
      • Nuit du Hack XV Quals - Reverse 350: Matriochka st...
  • ►  2015 (2)
    • ►  March (1)
    • ►  February (1)
  • ►  2014 (19)
    • ►  November (2)
    • ►  October (1)
    • ►  September (4)
    • ►  August (1)
    • ►  July (1)
    • ►  May (1)
    • ►  April (1)
    • ►  March (1)
    • ►  February (2)
    • ►  January (5)
  • ►  2013 (2)
    • ►  December (1)
    • ►  November (1)

Blog Roll

  • Kami Blog
    Hello world!
  • waliedassar
    Call64, Bypassing Wow64 Emulation Layer
Simple theme. Powered by Blogger.