B1ll_Gat35
Problem
Can you reverse this Windows Binary?
Solution
Stage 1: Analysis
Reverse the binary file using Ghidra (cheat sheet).
main()function:void FUN_00408040(void) { int iVar1; FILE *pFVar2; uint uVar3; int local_78; int local_74; char local_6c [100]; uint local_8; local_8 = DAT_0047b174 ^ (uint)&stack0xfffffffc; thunk_FUN_004083e0((int)s_Input_a_number_between_1_and_5_d_0047b06c); thunk_FUN_00408430((int)&DAT_0047b094); local_74 = 1; while (9 < local_78) { local_74 = local_74 + 1; local_78 = local_78 / 10; } if (local_74 < 6) { thunk_FUN_004083e0((int)s_Initializing..._0047b0b4); thunk_FUN_00407ff0(local_78,local_74); do { iVar1 = thunk_FUN_00415840(); } while (iVar1 != 10); thunk_FUN_004083e0((int)s_Enter_the_correct_key_to_get_the_0047b0c8); pFVar2 = (FILE *)___acrt_iob_func(0); thunk_FUN_004157db(local_6c,100,pFVar2); uVar3 = thunk_FUN_00407f60(local_6c); if ((char)uVar3 == '\0') { thunk_FUN_004083e0((int)s_Incorrect_key._Try_again._0047b0f8); } else { thunk_FUN_004083e0((int)s_Correct_input._Printing_flag:_0047b114); thunk_FUN_00408010(); } } else { thunk_FUN_004083e0((int)s_Number_too_big._Try_again._0047b098); } thunk_FUN_004084bf(); return; }I found
main()by going toSearch > Program Textand searching forInitializingin "All Fields" since that was a string that appears when the program launches. Clicking the one with the "PUSH" in the preview goes right to themain()function.
This is difficult to read but
thunk_FUN_00407f60()appears to validate the key. If this function returns 0 then the key is incorrect, otherwise the key is correct.
Option 1: Patching the binary
In this option we rewrite a single character of the assembly of the program to run the code to print the flag even if the key is incorrect.
During the analysis stage we saw this
if elseblock:pFVar2 = (FILE *)___acrt_iob_func(0); thunk_FUN_004157db(local_6c,100,pFVar2); uVar3 = thunk_FUN_00407f60(local_6c); if ((char)uVar3 == '\0') { thunk_FUN_004083e0((int)s_Incorrect_key._Try_again._0047b0f8); } else { thunk_FUN_004083e0((int)s_Correct_input._Printing_flag:_0047b114); thunk_FUN_00408010(); }If the function that checks the key we input returns 0 then the key is incorrect and we don't get a flag. Let's change that so if it returns 0 it jumps to the else block instead. We can do this quite easily thanks to Ghidra.
We are looking for the line
00408114 75 0f JNZ LAB_00408125in the assembly view. This can be easily found by clicking on theifof the if statement (which was discussed in step 1) in the decompiled view. This will highlight the correct line.The line directly before the aforementioned line contains the
TESToperation:00408112 85 c0 TEST EAX,EAX. What's important to know about theTESToperation is that it sets the flagsCFandOFto zero. You can learn more on [its wikipedia entry](https://en.wikipedia.org/wiki/TEST_(x86_instruction)). JNZ jumps to the specified location if the Zero Flag (ZF) is cleared (test for something not being equal). If we change theJNZoperation to theJNCoperation, which is true ifCF=0, then we will skip right to the else block. Remember, the CF flag is always zero after theTESToperation so the else will always run. In fact, the decompiler view doesn't even show it anymore after we make the change, as you will see in the next step. More info about all the operators related to JNZ can be found on this page.The make the above change, right-click on the
JNZoperator, choose "Patch Instruction", and change theJNZtoJNC. The decompiler view will update to the following:pFVar2 = (FILE *)___acrt_iob_func(0); thunk_FUN_004157db(local_6c,100,pFVar2); thunk_FUN_00407f60(local_6c); thunk_FUN_004083e0((int)s_Correct_input._Printing_flag:_0047b114); thunk_FUN_00408010();To recap, we changed the line from
00408114 75 0f JNZ LAB_00408125to00408114 75 0f JNC LAB_00408125.
Next, we need to export the program from Ghidra. Go to
File > Export Programand set the "Format" to "Binary". Select your desired save location and click "OK". Now rename the exported file fromwin-exec-1.exe.bintowin-exec-1.exe(remove the ".bin").Now, we can just run the executable with
wine win-exec-1.exe(modified executable: win-exec-1_patched.exe):Input a number between 1 and 5 digits: 1 Initializing... Enter the correct key to get the access codes: 1 Correct input. Printing flag: PICOCTF{These are the access codes to the vault: 1063340}
Option 2: Debugging to find the key
thunk_FUN_00407f60()function from Ghidra:uint __cdecl FUN_00407f60(char *param_1) { char *_Str; size_t sVar1; size_t sVar2; uint local_8; _Str = (char *)thunk_FUN_00407f40(); local_8 = 0; while( true ) { sVar1 = _strlen(param_1); if (sVar1 - 1 <= local_8) { return CONCAT31((int3)(sVar1 - 1 >> 8),1); } sVar1 = _strlen(param_1); sVar2 = _strlen(_Str); if (sVar1 - 1 != sVar2) break; if (param_1[local_8] != _Str[local_8]) { return (uint)(_Str + local_8) & 0xffffff00; } local_8 = local_8 + 1; } return sVar2 & 0xffffff00; }thunk_FUN_00407f40()appears to get the key. This function points tothunkFUN_00407e30(), which references a global variable calledDAT_0047c280with address0x0047c280. The last 4 values are the offset we want:c280.Next, we open the program in Ollydbg. I pressed "Execute till return (Ctrl+F9)" and typed
1in the program. Then, I hit "Pause execution (F12)", pressed the enter key, and then pressed "Execute till return (Ctrl+F9)" until the prompt for the key appeared. Now there are two options. You can disable ASLR on the binary using a method from this StackOverflow answer and then press CTRL+G and paste the offset,0xc280, we found. This will bring you to the value of the key. However, the easier option is to simply use the debugging step features and list all strings.To do the second option, first make sure you are on the
win-exemodule (click "Show Modules window (Alt+E)" and choosewin-exeto make sure) and thenright-click > Search for > All referenced text stringsas shown in the image below.
You will see
The key is: 4253360atPUSH 0F3C280(probably different first two characters because of ASLR).
Now just type the key into the program and hit enter to get the flag. Make sure to enter
The key is: 4253360, not just4253360.Input a number between 1 and 5 digits: 1 Initializing... Enter the correct key to get the access codes: The key is: 4253360 Correct input. Printing flag: PICOCTF{These are the access codes to the vault: 1063340}
Flag
PICOCTF{These are the access codes to the vault: 1063340}
Last updated
Was this helpful?