In this video, we tackle Zed's reverse engineering challenge from crackmes.one, titled "ZED-CrackMe." This challenge introduces us to packed executables and anti-debugging techniques. We'll explore how to bypass these anti-debugging measures and crack the challenge.
Resources:
- Challenge Binary: https://www.crackmes.one/static/crackme/5d41bf7633c5d444ad30189b.zip (Password: crackmes.one)
- IDA Pro (Freeware): https://www.hex-rays.com/products/ida/support/download_freeware/
- Kali Linux VM: https://drive.google.com/drive/folders/1SvyC1C2AkuaC-FNWvY0_Bhh-OhzZ5pJb?usp=sharing
Connect with Me:
- Instagram: https://instagram.com/jaybailey_216
- Twitter: https://twitter.com/jaybailey_216
- Mastodon: https://mastodon.social/@jaybailey216
- Patreon: https://www.patreon.com/jaybailey216
- Buy Me A Coke: https://buymeacoffee.com/jaybailey216
- Blog: https://jaybailey216.com/
Useful Links:
- Modulus w/out division: https://reverseengineering.stackexchange.com/questions/1397/how-can-i-reverse-optimized-integer-division-modulo-by-constant-operations
- Static vs dynamic linking: https://cs-fundamentals.com/tech-interview/c/difference-between-static-and-dynamic-linking
- More Detailed static vs dynamic linking: https://cs-fundamentals.com/c-programming/static-and-dynamic-linking-in-c.php
- Cytpe: https://braincoke.fr/blog/2018/05/what-is-ctype-b-loc/#reading-an-entry-of-__ctype_b_loc
- Section headers: https://linux-audit.com/elf-binaries-on-linux-understanding-and-analysis/#elf-sections
- SIDT Instruction: https://www.aldeid.com/wiki/X86-assembly/Instructions/sidt
#reverseengineering #reversingforbeginners #ctf