Skip to main content
New_orleans
  1. Ctfs/
  2. Microcorruption/

New_orleans

1 min· ·
sigchill
Author
sigchill
Welcome to my study blog. Here I document my CTF writeups and security research.

New Orleans challenge
#

this is the second challenge on microcorruption the first one is just a tutorial so i skipped it

!(img1.png)[img1.png]

We are greeted by this prompt as shown above this is a fairly basic challenge i have a feeling for that we browse the assembly code and see that there is a check_password section lets put a break there and go through it,

!(img2.png)[img2.png]

As we can see the password length is supposed to be 8, and theres a loop mechanism with r14 as its index, the intersting part is that the password validation is performed here

44c2:  ee9d 0024      cmp.b	@r13, 0x2400(r14)

it validates something from memory which means that if we go to address 0x2400 we’ll find the password so we did and we got it

Related