ben-sb@home:~$

  • Reversing VMCrack

    Today we will be taking a look at one of, if not the hardest, reversing challenges from Hack The Box. The challenge is called vmcrack and is well known among the HTB community for being difficult. This is backed up by the difficulty ratings for the challenge: the majority of...

  • Using Symbolic Execution to Devirtualise a Virtualised Binary

    Today I will be discussing a sample binary which features virtual machine obfuscation, an obfuscation technique where the source code is compiled to a custom bytecode language and executed by an interpreter for this language. I will not be covering the basics of how VM obfuscation works; if you would...

  • Deal or No Deal: Graphing a Binary Rev Challenge

    This post will describe solving a challenge from BYU Capture the Flag 2024. The challenge was called Deal or No Deal and was in the rev category. A compiled Rust binary is provided. Binary Ninja wasn’t great at handling this sample, so I used Ghidra instead. Following the entry point...

  • Reversing a Broken Rust Binary

    This post describes reverse engineering a Rust binary from the rev section of TBTL Capture The Flag 2024. The challenge is named Safe Rust and provides a compiled Rust program. The challenge description indicates that the program “isn’t functioning properly”, and indeed when we run it we get the message...