Tryhackme — Reverse Engineering

0xNehru
3 min readJun 4, 2021

--

1.crackme1

hint :- did you check the strings stored in the executable?

./crackme1.bin

chmod 777 crackme1.bin

Now I have the answer.

strings crackme1.bin

Let’s debug,

r2 -d ./crackme1.bin

and ..Analyze command — aaa then afl is list of functions and There’s a main function.

There’s password declaration and strcmp function.

pdf @main

Let’s look into variable’s value.

Set breakpoint at strcmp

db 0x56163a9737c7

dc

pdf @main

Now I have breakpoint.

px @ rsi

There’s a password.

#1 :- what is the correct password?

Answer :- hax0r

2.crackme2

Run the program

./crackme2.bin

strings ./crackme2.bin

Let’s debug,

r2 -d ./crackme2.bin

There’s a main function.

There’s comparison with value.

Convert from hexa to decimal

#2 :- What is the correct password?

Answer :- 4988

3.crackme3

Run the program,

./crackme3.bin

Let’s debug,

Run another step…..

dspdf @main

Let’s check the value

Variable “var28_h” is “rbp-0x28”.

px @ rbp-0x28

I just try to answer this and it’s correct.

#3 :- What are the first 3 letters of the correct password?

Answer :-azt

--

--

0xNehru
0xNehru

No responses yet