WhiteHat 2k18 – re06
WhiteHat came just after the Hackon CTF. I did not try the challenge during the CTF. But then the challenge was quite decent. It was a .net binary. About the binary: The binary was .net so I dec...
WhiteHat came just after the Hackon CTF. I did not try the challenge during the CTF. But then the challenge was quite decent. It was a .net binary. About the binary: The binary was .net so I dec...
The challenge was pretty easy. It had some conditions to bypass to get to the actual flag checking. About the binary: I first opened the binary in IDA and saw that there were 5 conditions to bypa...
What is a Syscall? System calls are requests that a program can pass to an operating system, to make it act on the program’s behalf in carrying out some task the program itself can’t do. Basic Sy...
The program took the string as an input and then added 2 random strings and added them before and after it. Inside the function: It takes each letter from the string and check whether it is prese...
So here I am, up with my first blog post. This post is basically an intro on how to debug a program using gdb. GDB or GNU Debugger is extensively used in debugging programs written using mainly Ad...