I sure miss radare2, it’s a fact! So, when I looked at the level13 code and realized that it hidden some token, radare2 was the…
I sure miss radare2, it’s a fact! So, when I looked at the level13 code and realized that it hidden some token, radare2 was the…
After a few months without using radare2 it’s now time to get back to the write ups. During this time, and as you can see…
Today, I bring to you another binary bomb that I found in 0x00sec website. This bomb has 4 stages, each one corresponding to a color. Let’s now defuse it,…
The exercise of this week is a bomb! A binary one, of course. The bomblab is an exercise from the UCR that I found here. I…
If you are an active reader of this blog (if you aren’t, why not start now?), then you probably know that I’ve been solving exercises…
When we check the available functions, we’re able to notice that the names have changed again, as they are similar to the native functions. Another…
Crackme0x07 is the exercise of this week. New tricks are used to make our task more difficult. This tricks includes function names identical to native…
Crackme0x06! A new exercise, a new function. Also, some new tricks are used to obtain the so wanted “Password OK”. This exercise is very alike…
When I started writing this posts about radare2, I was expecting to learn how to work with this tool. That was the objective and what…
All the exercises solved so far, had one thing in common: there was only one solution for the problem. Crackme0x04 does not inherit that characteristic…