DEV Community

Cover image for CTF Writeup: picoCTF 2022 Reverse Engineering
Lena
Lena

Posted on • Updated on

CTF Writeup: picoCTF 2022 Reverse Engineering

My picoCTF 2022 writeups are broken up into the following sections,
1. Forensics (Solved 13/13)
2. Cryptography (Solved 11/15)
3. Binary Exploitation (Solved 5/14)
4. Reverse Engineering (Solved 2/12)
5. Web Exploitation (Solved 2/12)

All my writeups can also be found on my GitHub's CTFwriteups repository

The Reverse Engineering challenges I solved in picoCTF 2022 are the following,

Table of Contents

All my writeups can also be found on my GitHub's CTFwriteups repository

file-run1

The challenge is the following,

Figure 1

We are also given the executable file run.

I added executable permissions using,

$ chmod +x run

And executed using,

$ ./run

Which gave me,

Figure 1

Therefore, the flag is,

picoCTF{U51N6_Y0Ur_F1r57_F113_102c30db}

file-run2

The challenge is the following,

Figure 1

We are also given the executable file run.

I added executable permissions using,

$ chmod +x run

And executed with Hello!

$ ./run Hello!

Which gave me,

Figure 1

Therefore, the flag is,

picoCTF{F1r57_4rgum3n7_4653b5f6}

Discussion (0)