NoobCTF 0x1
Description: Writeup of all the rev challs in NoobCTF 0x1
Introduction
All of the reversing challenges in this CTF were packed with upx. Therefore, I’ll be talking about only the decrypted versions of these challenges. All of them were decrypted with the simple command upx -d infile -o outfile. All of them are also Rust challenges that were more or less solved by traversing around it to invoke a certain function.
Stringcrack
Question: The String is all you have
Points: 150
Short Writeup
Get into the StringCrack::crack1 function and change ZF two times to get into the right method that prints out the flag
Flag
noob{n0boot0br00t}
Lenrev
Question: Crack | Compare | Bypass
Points: 200
Short Writeup
lenrev::crack is the function where the flag is. Traverse to that function and bypass an if condition, and you’ll get the flag.
Flag
noob{bufferr34d}
ReplaceFunc
Question: Crack and redirect your way to the top of the hill
Points: 200
Short Writeup
The flag is in replacefunc::function1 and can be printed out by changing one ZF.
Flag
noob{easybyp4ss}