Reversing
200 CSAW 2013
Credit to Ryan
This challenge was fairly simple you are given a
Windows PE. The first thing we did was attempt to run the executable, however
as soon as you run it the program will just crash. Next we decided to open the
executable in Ida Pro.
To reverse the key we simply opened the program in
the debugger and forced the program to follow the execution path we wanted
(making sure to step over the debugger trap of course). From there we were able
to find the key in memory and submit the flag.
No comments:
Post a Comment