Introduction

Hello and welcome back yet again! Today we have a simple crackme written in Assembler. Someone I’ve been helping recently sent me the binary asking for help. When I originally looked at the binary I was confused because I was expecting a C/C++ binary. Only to learn later that it was written in Assembler which changed how I looked at the binary. The challenge honestly is not very difficult but I did learn a few interesting instructions so I wanted to share what I learned. Let’s take a look shall we? …


Introduction

Hello and welcome back! Today we have another pwn challenge from HackTheBox. Now, this challenge took me a lot longer to solve, but I blame the shellcode not working as it should 😂. Anyway, in the last pwn challenge our exploit simply forced the program to execute “dead code.” In this challenge, we will be super 1337 and save the world from the J0k3r and pop a shell! We received a binary that can track the Jok3r and execute commands after providing it with the password. Come help me save the world! You can also see my video tutorial on…


Introduction

Hello and welcome back! In this blog post we will solve a fairly simple reverse engineering challenge that exposes us to the dreaded SIMD instructions. These are instructions used in floating point operations among other things. Luckily this challenge wasn’t too difficult even with these crazy instructions. If you prefer to watch YouTube videos you can check out my corresponding walkthrough below.

Flotte Walkthrough

Optional Materials to Follow Along

If you want to follow along you can download my VM. The binary will be in the /home/kali/reverse_engineering/crackmes/sh4ll2 directory. Of course you don't have to use my VM, but you will need the binary. You can…


Introduction

Hello there! Someone from the crackmes.one discord channel asked for some help with this challenge. Although they ended up solving it on their own (good for them!) I also solved it and thought I should share my solution. This challenge is fairly simple but it was written in C++. C++ binaries always give me a little bit of trouble, but I think I learned a lot during this challenge and I hope you will too! As always, you can check out my video walkthrough on my YouTube channel.

Reverse Engineering Challenge — First Ever Crackme Video Walkthough

Optional Materials to Follow Along

If you’d like…


Introduction

Hello! Welcome to my first blog post! In this post, we will take a look at a simple reverse engineering challenge called Sh4ll0 from the website crackmes.one. My intended audience are noob reverse engineers like myself. However, if you are more experienced I’d be delighted if you gave this a read and let me know how I can further improve my skills! I tend to be verbose in my walkthroughs. I also refrain from using the decompiled output as I think it will make us better reverse engineers by reading and understanding the disassembly. If you are a more visual…


Introduction

Hello yet again! We are back to solve another challenge! This is going to be a fun challenge. As the name implies our goal is to find the secret flag. The description for this challenge says, “Find the secret flag and get the name of the creators of this challenge!” We are provided with the name of the author already: decoder. Additionally, the name of the person who solved this challenge first is stefano118. Both of these will be important later in this challenge. If you want, you can view the video walkthrough on YouTube.

Find the Secret Flag Video…

Jay Bailey

I am a beginner reverse engineering looking to improve my and (hopefully) your skills. Join me on my reversing journey!

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store