Interesting challenge, learned a lot. I struggled a lot with the tools (openssl and such) and though I suspected (correctly) what the solution should be, it was really difficult for me to execute it just right and work around all the tooling issues.
Yeah, the challenge looks broken now for the first step. I solved it a few days ago but when trying to help someone just now, I saw the information has changed now and I don't think one can get past the first step without help. Needs to be fixed.
I also dumped the shellcode to disk. (Carefully) used VB to do it which took care of the negative numbers and all. Now trying to make sense of that.
Edit: Got it. This was a great challenge. Learned a lot. Interesting read I stumbled across about r…
Solved this just by looking at the disassembled code, no debugger necessary (though it'd help I guess). Found the function and quickly brute forced the key with cyberchef. I feel this one was easier than "Debug Me".
Ugh, that one was hard. Pretty new to reversing but slogged through it. I only used x32dbg (comes with scylla, I guess).
Good reading that helped me through it: http://pferrie.host22.com/papers/antidebug.pdf
Good lord, I spent too many hours trying to reverse/fix the broken binary. Finally saw the Star Wars references here and after one look-up, got the flag instantly. No reversing required after all.
Happy to help via PM.