##Reverse 1 (Simple) - 100pts
The code isn’t very long and we can quickly see that the function
callMeMaybe will never be called in a normal execution
[...] .text:0000000000400918 mov [rbp+var_4], 1 .text:000000000040091F cmp [rbp+var_4], 0 .text:0000000000400923 jnz short loc_40092F .text:0000000000400925 mov eax, 0 .text:000000000040092A call callMeMaybe .text:000000000040092F mov edi, 1 .text:0000000000400934 mov eax, 0 .text:0000000000400939 call _sleep [...]
If we look more closely at the
callMeMaybe function, we notice there is a bunch of encrypted data (or so it looks like), and then some code that could be roughly translated in Python as:
encrypted_bytes = [ ... ] current_time = time.time() x = pow( 2, current_time % 16 ) decoded_string = "" for i in xrange(0, 13): #Loop 12 times a = encrypted_bytes[ i_50 - x*4 ] b = encrypted_bytes[ i_90 - x*4 ] if i % 2 == 0: decoded_string += chr((a ^ b) % 128) else: decoded_string += chr((a + b) % 128) x += 1 print decoded_string
For this challenge, you could simply edit the value of
0 before the decryption loop starts to get the full decrypted key:
##Reverse 2 (Welcome) - 100pts
I found that a static analysis approach to this problem worked very well.
The first thing you notice when checking out the
main was that the program accepted two (and only two) arguments. It then proceeded to check if the two arguments formed a valid pair (as per a certain “br0 code” algorithm).
The reversed algorithm for building a pair was:
original = "..." final = "" for c in original: for i in xrange(0,3): final += chr(ord(c)+i) print final
The key was the br0 code for the event,
felicity, which is
##Reverse 3 (Let’s Float) - 200pts
When I first ran the executable, the program output wasn’t too helpful.
The author of this question is: NEHAL JW
He is also known as 31415504713243874993144365269619144804738951469063106995958138362195207906814846878> 639559523605055359252709769216.000000
Tell me what FELICITY is known as?
Answer in the format md5(str(x)[0:10])
However, once you decompile it…
mov rax, 574A204C4148454Eh [...] mov edi, offset format ; "The author of this question is: " [...] mov edi, offset aHeIsAlsoKnownA ; "He is also known as %lf\n"
W J L A H E N 57 4A 20 4C 41 48 45 4E
It is then easy to see that FELICITY would be the
%f representation of
0x59544943494C4546, which is
##Reverse 4 (Delme) - 300pts
Delme was an interesting program… I think ?
After some investigation, I noticed a function really similar to the decrypting algorithm of
I was able to reuse the same algorithm described in
Reverse 1 to get the key for this problem:
##Reverse 5 (Whereami) - 200pts
After my luck on
Reverse 4, I decided to look for a decrypting funtion again. I found one identical to
Reverse 1 and
Reverse 4, gave my script a spin again , and got the following key:
I don’t know why gdb is false, but yay!
##Reverse 6 (Bomb) - 400pts
Never change your winning formula. I went looking for that same function once again.
However, the organizers wisened up, and modified their algorithm a little. Here is my new updated script:
encrypted_bytes = [ ... ] current_time = time.time() x = pow( 2, current_time % 16 ) decoded_string = "" for i in xrange(0, 13): #Loop 12 times a = encrypted_bytes[ i_40 - x*4 ] b = encrypted_bytes[ i_80 - x*4 ] if i % 3 == 0: decoded_string += chr((a * b) % 128) else: if i % 2 == 0: decoded_string += chr((a ^ b) % 128) else: decoded_string += chr((a + b) % 128) x += 1 print decoded_string
And you get the key:
##Reverse 7 (b00m2) - 400pts
It seems like the organizers know what we’re up to:
If you want to have more fun, stop looking at assembly, and try to figure out what exactly the program wants.
Well - that is a weird request for a reversing challenge, isn’t it?
After looking at the code, I noticed the organizers added a couple of decoy decrypt functions (about 5). Since I was too lazy to try them all, I decided to give it a spin through gdb.
The program was waiting for input on a socket, and seemed to loop a couple of times. I just skipped over all the socket stuff (sorry guys!) and made it to the defusing part of the bomb (the real defusing).
Once I got there, I noticed there were two of the multiple decrypt functions called. I decided to start with the last one since the first one clearly outputs “This is not the key” (but that could have been a trap..). I reused
Reverse 6’s script and got the following key: