can you login to this secret_login program cbe1369d57cd131d6d5b1787d02511c6.zip Let’s look at the file information first.
1 2 |
$ file reverse_q reverse_q: ELF 64-bit LSB pie executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 3.2.0, BuildID[sha1]=e80026c2c5e2fb97d997aed44527bd5e79c78566, not stripped |
Let’s run the program once to see what it does.
1 2 3 4 5 6 7 8 9 10 11 12 |
$ ./reverse_q --------------------------------------- | CBM-CTF | Reversing is not that much easy --------------------------------------- Choose an option 1 = Register 2 = Login 2 Enter username AAAA User Does not Exist |
It has register and login features. After decompiling it, I noticed the following… Continue Reading →
Copyright © 2019 PwnDiary