Hey everyone, this is a walkthrough for the reverse engineering challenge "sh4ll10" from crackmes.one. In this video, I'll guide you through the process of analyzing the binary using Ghidra, uncovering the logic, and ultimately solving the challenge. Whether you're a beginner or looking to sharpen your skills, I hope you learn something valuable!
Have any other reverse engineering challenges you'd like me to tackle? Leave a comment below, and I'll give it a shot!
Resources:
-
Challenge Binary (Password: crackmes.one): https://crackmes.one/crackme/5ccf3bf333c5d4419da559bd
-
Ghidra (Used for Analysis): https://ghidra-sre.org
-
OpenJDK (In the video I used JDK 14, However, you now need JDK 21+) I'll link both below: https://download.oracle.com/otn-pub/java/jdk/14.0.1+7/664493ef4a6946b186ff29eb326336a2/jdk-14.0.1_linux-x64_bin.tar.gz
-
JDK 21 can be found here: https://adoptium.net/temurin/releases/
-
Kali Linux VM (Used for Testing): https://drive.google.com/drive/folders/1SvyC1C2AkuaC-FNWvY0_Bhh-OhzZ5pJb?usp=sharing
Timestamps:
- 00:00 Intro
- 00:42 Initial Exploration
- 05:35 Setting up Ghidra Project
- 08:06 Analyzing with Ghidra
- 20:00 Becoming Good Boys
- 21:03 Analyzing Decompiled Code
- 23:00 Outro
Connect with Me:
Hashtags:
#reverseengineering #reversingforbeginners #ctf #crackmes #ghidra #infosec #cybersecurity #binaryanalysis