Skip to main content

2 posts tagged with "Ghidra"

Ghidra is a reverse engineering (RE) framework developed by the National Security Agency (NSA). It provides a set of tools and features to help analyze and understand binary code, including disassembly, debugging, and decompilation capabilities. Ghidra allows users to create custom scripts, plugins, and workflows to automate tasks and simplify the RE process, making it useful for identifying vulnerabilities, understanding malware behavior, and reversing proprietary software.

View All Tags

HTB | You know 0xDiablos | Write-Up

· 22 min read

Summary:

We prepare for a challenge by preparing challenge files and testing the executable. Next, we perform static analysis using Ghidra to identify potential vulnerabilities. Upon discovering a buffer overflow vulnerability, we verify its existence and proceed to analyze the target architecture and endianness using pwntools' checksec feature.

With this information in hand, we use GDB and PEDA to identify the offset and address of the flag() function. We then craft a malicious payload using pwntools to smash the stack and exploit the vulnerability. Before submitting the exploit to the target machine, we verify its effectiveness against a local copy of the executable. After successfully exploiting the target, we submit our exploit and grab the recovered flag, declaring Challenge Completed once the task is accomplished.

Challenge Name: You know 0xDiablos | Difficulty: Easy | Category: Pwn

HTB | Find The Easy Pass | Write-Up

· 11 min read

Summary:

We navigate the Hack The Box CTF platform, preparing for a challenge by preparing challenge files and testing the executable. We then perform static analysis using Ghidra and dynamic analysis with OllyDbg to gain insight into its behavior.

Next, we run the executable with test data and track where it stores this data in memory, checking the surrounding environment to better understand the context. With this knowledge, we extract the password and verify it by running the executable again with the password as input. Finally, we submit the flag as HTB{<password>} and declare Challenge Completed.

Challenge Name: Find The Easy Pass | Difficulty: Easy | Category: Reversing