June 14, 2024, 9:10 p.m. | Gr33nWizz

System Weakness - Medium systemweakness.com

This is a writeup of reverse engineering challenge from pwnable.kr called “flag”.

I used Radare2 to solve this challenge, so let’s get started.

r2 ./flag    //Let's go through the file first
DON'T forget to change the permissions of the file using chmod.

Now, let’s analyze the file and see what functions are there,

Also let’s see the strings that this binary file contains:

azz //This is the command to view strings
or
azz ~.. //This basically using less to that …

binary called challenge change cybersecurity engineering file flag functions permissions pwn pwnablekr-writeup radare2 reverse reverse engineering strings using writeup

Information Technology Specialist I: Windows Engineer

@ Los Angeles County Employees Retirement Association (LACERA) | Pasadena, California

Information Technology Specialist I, LACERA: Information Security Engineer

@ Los Angeles County Employees Retirement Association (LACERA) | Pasadena, CA

Solutions Expert

@ General Dynamics Information Technology | USA MD Home Office (MDHOME)

Physical Security Specialist

@ The Aerospace Corporation | Chantilly

System Administrator

@ General Dynamics Information Technology | USA VA Newington - Customer Proprietary (VAC395)

Microsoft Exchange & 365 Systems Engineer - TS/SCI with Polygraph

@ General Dynamics Information Technology | USA VA Chantilly - 14700 Lee Rd (VAS100)