trustie_rity
3 min readFeb 13, 2022

CYBERYAMI CTF

REVERSE ENGINEERING AND MALWARE CHALLENGES ONLY

  1. MALWARE

a) Basic identification

I used strings command here .The file is packed using upx.

b)MalVBA-I

I used strings command too,and used grep .exe .

c)MalVBA-II

This was a little challenging . i used ole tools .solemnize is the name of stream 6706 . Use oledump and the flag is the name of the 6706 stream. https://spreadsecurity.github.io/2016/08/14/macro-malware-analysis.html

2 .REVERSE ENGINEERING

a)Easy success

b)Key Bank

Mostly using strings to solve is not the way intended by the guy who made the challenge . We use the privilege regardless.

c)Medium Hash

This binary is designed to :

lets use ghidra to solve some mysteries here haha.The binary is stripped so i find the main address using the entry function .

So the code is self explanatory … if condition is true it checks if string is true and then prints the flag.

d)Fil3s

So this too is stripped .

When you give an input it is compared with a value then if condition is false it opens standard output stream and writes to wrong.txt ,am guessing if the condition is true it would have created a correct.txt .

This clarifies that if the condition is true it will create a flag.txt file and write flag into it .Using ghidra i saw a condition comparing some value to 56 , so lets give it a shot .

Great and the value is true , check the code with ghidra for better understanding .

Thanks for you time :)

trustie_rity
trustie_rity

Written by trustie_rity

Offensive Penetration Tester | M4lici0s Lif3 | Find video walkthroughs on my yt channel: https://www.youtube.com/@trustie_rity https://johnkiguru1337.github.io/

No responses yet