All of the reversing challenges in this CTF were packed with
upx. Therefore, I’ll be talking about only the decrypted versions of these challenges. All of them were decrypted with the simple command
upx -d infile -o outfile. All of them are also Rust challenges that were more or less solved by traversing around it to invoke a certain function.
The String is all you have
Get into the
StringCrack::crack1 function and change ZF two times to get into the right method that prints out the flag
Crack | Compare | Bypass
lenrev::crack is the function where the flag is. Traverse to that function and bypass an
if condition, and you’ll get the flag.
Crack and redirect your way to the top of the hill
The flag is in
replacefunc::function1 and can be printed out by changing one ZF.