Shadow CTF | Vault (write-up)

0UR4N05
Jan 27, 2021

Hello guys it’s 0UR4N05 again , today i’ll solve a reverse engineering challenge

challenge description : Open a Vault to get the flag……(sounds like that)

This challenge gave us an executable who need a password to give you the flag , the first thing to do is extract all strings in the executable :

as you can see there is no password clear , so we gonna use ltrace to extract strings while running the executable

as you can see there is a strcmp who compare our fake password with another string so i think this is the password required

yeah that was our key “hackers_access” and we got the flag

Thanks for reading , 0UR4N05

--

--