😄 Welcome to my blog.
- 📝 Here I share my knowledge and thoughts.
- ⚡️ Enjoy your stay and happy reading <3.
😄 Welcome to my blog.
Challenge This was a easy challenge from HSCTF 8. We were given source code of a program which we had to reverse engineer and find the flag. import java.util.Scanner; public class WarmupRev { public static String cold(String t) { return t.substring(17) + t.substring(0, 17); } public static String cool(String t) { String s = ""; for (int i = 0; i < t.length(); i++) if (i % 2 == 0) s += (char) (t....
THM - Official Binary Heaven Walk-through This is a THM room created by swanandx and Lammm that touches on exploiting binary. This is our first time creating a room and we hope you will enjoy it. Link to room: https://tryhackme.com/room/binaryheaven Task 1 - Deploy the machine Like what the task suggested, deploy the VM and move on to Task 2. Task 2 - Being worthy Upon downloading the task file, we get a zip file credentials....
What is in this post? You might have seen something like “Product Keys” for some softwares or some other applications, but how exactly do they verify if the key is correct ? They implement a function that will validate key. We will be reverse engineering a binary, which validates a key using some function, and then we will write a key generator, i.e key-gen, for it to generate valid keys....
What is this about? I saw a lot of people struggling to solve easy reverse engineering (RE) challenges (me too when I was just starting), well, I am not saying I am great at it now, but have really improved my skills so that now I can solve many RE challenges in ctfs. That is why, I am writing this blog, hoping it will help at least a few people....