[Reverse] Headache

Anything thatā€™s incorrect is not the flag. Try again.

Any tutorials or steps I can follow to bypass the ptrace anti-debug technique for this challenge.
I observed ptrace detection found in elfparser.

For those who are still struggling with this, bear in mind that an ELF file can be modified somehow sometimes on the fly. So donā€™t trust what you see by using conventional static analysis tools such as radare2 or IDA.

This binary is full of fake flags, donā€™t despair and try harder.

Type your comment> @uNam3m3 said:

Any tutorials or steps I can follow to bypass the ptrace anti-debug technique for this challenge.
I observed ptrace detection found in elfparser.

Google is full of references to this. You can either patch or debug the binary.

If you are debugging , think what ptrace returns when it does fail and change this value to bypass it.

Finally did it. Holy ā– ā– ā– ā–  this challenge was annoying. Though saying that, I did learn an absolute ton about GDB in the process so itā€™s not all that bad. Anyone attempting this, watch out for troll flags. There are like 5 of them or something absolutely silly.

Really enjoyed this challenge, lots of learning and a few headaches :slight_smile:

For me, it was getting over the first hump was the hardest. Afterwards the rest flows fairly naturally. I used mainly GDB and Ghidra.

Do not stop at the first step you may miss somethingā€¦ With the help of strace and a good debugger it does the trickā€¦ well it was c000l and not so h4rd if you want to finish it h3r3 in time

Type your comment> @job0 said:

Really enjoyed this challenge, lots of learning and a few headaches :slight_smile:

For me, it was getting over the first hump was the hardest. Afterwards the rest flows fairly naturally. I used mainly GDB and Ghidra.

Ghidra isnā€™t showing me any functions.

Solved but my head is on fire!

I found the function where there is the md5 o simply hex char sequence, and that is used in a function with bestā€¦ everā€¦ strings . is that the right function ?

Holy mother of ************* this was so ā– ā– ā– ā– ā– ā– ā–  difficult. I learned so much from this though.

I tried to get flag but all of them fake.
If I run debug and enter the flag, result will ā€œLogin success!ā€; but I directly run script, itā€™s failed.
I tried to modify some instruction but error.
Please give me some hint!!!
Thanks so much!

Edit: Too many fake flags but I eventually found the right one. So headacheā€¦

Has anyone gotten Ida to run/debug this, it keeps giving me an error because it not a ā€˜standardā€™ executable. I think I understand how it was compiledā€¦ but that doesnā€™t help me run it

Did anybody use angr for solving this kind of challenge?

Iā€™ve done all the lower points challenges but Iā€™ve got no idea on where to start to do this one. Is there any good reference to study?

Finally got this one!!! Lots of headache for sure. But at the same time good learnings.

Man, I took way longer on this than I really needed to. Once I realized what was happening, and tread carefully, I knew right where to go. Good challenge!

I used mainly GDB and objdump for this. Also needed Capstone for some more analysis.

For anybody whoā€™s still stuck, let me try to give some non-spoiler hints (if these count as spoilers, feel free to remove this):

  1. (GDB) Catchpoints may help you figure things out a bit.
  2. Read the description of the challenge, itā€™s important.

Done! Great challenge.

Can anyone help me out with this? I know what is messing up my debugging, but I canā€™t figure out where it is going after thatā€¦

Done!
IDA free did the trick