Home pointer overflow 2024 Reverse300-2
Writeup
Cancel

Reverse300-2

Hightlighted techniques

  • procmon
  • using burpsuite as proxy

Learning the game

We are presented with a file called Reverse. I run the file command against it:

Reverse300-2.exe: PE32+ executable (console) x86-64, for MS Windows, 10 sections

1
2
3
## ./Reverse300-2.exe
Fetching the flag from a secure source...
Success!

Playing the game

Okay so I got kinda stuck in the beginning for this one I’ll admit, I tried looking at the program in ghidra and looking for where the Success! string was being printed, but I couldn’t find it.

Finally, I decided that the “secure source” from where the flag was being gotten had to be one of two:

  • a hidden file created at runtime
  • some remote server

So I looked at what the program does with procmon.

img_26.png

After applying a few filters to make it easier we can see that the program is clearly performing some http request, so I will use burpsuite to intercept the data for this request

img_25.png

Flag

user: root:
Trending Tags