Hello guys it’s 0UR4N05 again , today i’ll solve a reverse engineering challenge
challenge description : Help crow to drink the water…..(something like that)
The solution of this challenge is the same to Vault and other challenges i’ll just do it .
So our executable need a password too , i’ll run strings to extract all strings in the executable
not too much , so i’ll run ltrace to extract strings while the program is running
again we have a strcmp function who compare our password with the original password
so we got our flag using ltrace .
Thanks for reading , 0UR4N05