[Reversing] Bypass

I create the post to collect all the ideas about the challenge. obviously without giving spoilers

nemen91

Comments

  • Pretty cool challenge, learned some new tricks. What I did wasn't reversing per se, but it should be possible.

    clubby789

    • GCIH
      If you need help with something, PM me how far you've got already, what you've tried etc (I won't respond to profile comments, or on box release night). And remember to +respect me if I helped you ; )
  • Nice challenge. I used a disassembler and some breakpoints to get the flag.. But i don't undestand how i could get the flag with static analysis. Someone could pm me?

  • If someone finds a way to get the flag with static analysis PM me.
    I created the Challange and it was meant to use a Debuger like Dnspy :)

    Baikuya
    OSCP

  • This was a very simple challenge and basic practice for newcomers in re. i quite like this, kudos Baikuya!

  • Type your comment> @Baikuya said:

    If someone finds a way to get the flag with static analysis PM me.
    I created the Challange and it was meant to use a Debuger like Dnspy :)

    That's a huge spoiler in itself

  • Type your comment> @unsux said:

    This was a very simple challenge and basic practice for newcomers in re. i quite like this, kudos Baikuya!

    Thank you very much

    @dosxuz said:
    Type your comment> @Baikuya said:

    If someone finds a way to get the flag with static analysis PM me.
    I created the Challange and it was meant to use a Debuger like Dnspy :)

    That's a huge spoiler in itself

    Well I dont think so. If you read the challange description you can see that you must bypass something....

    Baikuya
    OSCP

  • It took me longer to clone and build dnSpy than to do the bypass 😁.
    Great tool!! Thanks

    Hack The Box

  • First time using dnSPY. I had difficulties recompiling the code but found a work around. Overall cool simple challenge. PM for nudge

    GotRoot
    If I helped you out at all, feel free to click my badge and give +1 respect!

  • This challenge was really fun for a complete noob like me. Thanks @Baikuya!

    It ain't much, but it's honest work
    sparrow1

  • Your welcome :)

    Baikuya
    OSCP

  • Cool challenge, I first tried the other spy, but the obfuscation was "unbreakable" :-). Learned something new.

    k4wld

  • Type your comment> @Baikuya said:

    If someone finds a way to get the flag with static analysis PM me.
    I created the Challange and it was meant to use a Debuger like Dnspy :)

    I did in fact complete the challenge via static analysis. I'll PM you.

  • This was fun. I didn't know much about .NET and reversing it, nor did I know much about the tools to do it, so this was a very nice way to get to know them both.

Sign In to comment.